
iSecurity Visualizer enhances IBM i auditing with robust features and a user-friendly interface. It allows IT managers to graphically analyze security activities, making investigation and analysis simple, even for non-technical users.
Vendor
Raz-Lee
Company Website
iSecurity Visualizer
Enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters. It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge. iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.
Key features
Integrates with every product on the iSecurity Suite
Special functionality has been added to Visualizer to assist in visually analyzing User Profile attributes instantaneously!
- Visualizer interfaces to iSecurity products such as Audit, Firewall, AP-Journal and FileScope to help in finding the “needle in the haystack” when investigating possible security breaches or other critical system activity.
- This feature is especially useful to System Administrators and Help Desk personnel in managing and monitoring User Profile passwords, status, authorities and more.
Drilling Down into Log Files
iSecurity Visualizer enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters. It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge. iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.
Set up multiple filter criteria
The user simply clicks to select filters and a 3D pie chart, or similar graphics, appears in moments and shows the exact breakdown by the selected criteria.
- Extract the information you need for cross-correlation data analysis, comparison and investigation
- Replaces time-consuming and error-prone batch job executions
- Extract log data fitting your specific needs instantaneously
- Quickly analyze and monitor important User Profile information such as passwords, disabled/enabled status, User Class, special authorities, etc.