iSecurity Capture for IBM i

IBM i Screen Tracking Solution

User Screen Security Tool

Capture user screen security tool for ibm i

iSecurity Capture is a 5250 screen tracking solution that silently photographs, saves and plays back user sessions on the IBM i server. Screens are captured and stored in real-time, arranged according to individual capture ‘sessions’, easily retrievable, have flexible scrolling, and a powerful free-text search engine. Capture complements journals and reports with a visual audit trail of user activity. 

iSecurity Capture’s invaluable tracing capabilities allow organizations to conform with the compliance requirements that apply to industries such as banking, insurance, health care, and defense. iSecurity Capture works as both a stand-alone product and as a fully integrated module in the iSecurity suite.

iSecurity Capture Key Features

  • Tracks and monitors suspicious users
  • Runs a playback of all captured screens
  • Includes powerful text search tools
  • Complete solution for common industry tracking regulations, including documenting of queries
  • Real-time screen capture and storage
  • Collection and documentation of CL Scripts
  • Screen captures are selectable by various criteria
  • Option for notifying users upon sign-in that their screens are being recorded
  • Fully integrated with Audit
  • Assists Help Desk and technical support by playing back user screens
  • Legally valid evidence in court

Capture is a green-screen tracking solution that  automatically captures and saves user activity as displayed on System i (AS/400) screens.

Capture works invisibly in the background without adversely affecting system performance. Users may not even be aware that it is collecting their screen activity.

Capture’s invaluable tracing capabilities allow organizations to conform with the compliance requirements that apply to industries such as banking, insurance, health care, and defense. Capture works both a stand-alone product and also as a module fully integrated into the iSecurity suite.

In today’s increasingly complex business environment, effective and searchable audit trails are a key component of any organizational IT security program.  Regulations require many organizations to maintain detailed transaction activity records and to retain these records for an extended period of time.

In addition, IT departments and technical support personnel need to monitor user activity in order to troubleshoot error conditions, track performance bottlenecks, and ensure compliance with organizational policies.  This often requires detailed knowledge of not only what users are doing, but also, how they are doing it.  Computer logs and audit reports, more often than not, do not provide enough forensic evidence for these purposes.

Capture solves this problem by complementing journals and reports with a visual audit trail of user activity. Capture shows exactly what users are doing and when they are doing it!  Screen capture sessions are initiated as required and are retrievable using an intuitive process featuring flexible scrolling and a powerful free-text search engine for locating the captured data screens and logs. 

Within each screen capture session, you can scroll through the screens sequentially or you can use the moveable Capture Menu to jump directly to a particular screen or search for screens containing a specific text string. The Capture Menu also provides commands for displaying the job log and the Audit log entries related to the particular screen and capture session. You can even access the DSPJOB command and print the screen directly from the Capture Menu.

  • Provides three solutions in one product – a powerful auditing solution, a regulation compliance solution, and a help-desk troubleshooting solution
  • Captures and retains all System i green-screen user activity screens according to predefined criteria such as IP address, user profile, job name, date/time
  • Replays user session screens, as if looking over the user’s shoulder
  • Enables compliance with Sarbanes-Oxley, HIPAA, the California Privacy Act and other regulations
  • Preserves job logs and CL Command logs for subsequent review, even after a session is finished
  • Uses a simple rule definition process suitable for both IT professionals and non-technical users
  • Archives captured screens offline to meet data retention requirements without consuming excessive disk resources
  • Searches user sessions in a specific timeframe, in accordance with any screen content, for example, mortgage or patient number specified in the screen
  • Easy navigation through captured sessions via moveable Capture Menu
  • Runs either in “silent-mode” or as a deterrent known to possible offenders
  • Automatically triggers screen capturing according to a variety of pre-defined rules
  • Searches screens for suspicious content using a powerful text search capability
  • Saves hours of tedious work and costly phone calls in the event of an application-related problem
  • Retrieves captured user screens easily via a user-friendly display
  • Reduces operational risk and fraud
  • Provides an invaluable troubleshooting aid for Help Desks and Technical Support departments
  • Works as a stand-alone product yet fully integrates with other iSecurity modules
  • Installs in minutes, non-invasive and is risk-free

Related IBM i Auditing Products


Read more