Search
Close this search box.

iSecurity Audit

iSecurity Audit examines events in real time, and triggers alerts and other responsive actions to potential threats. New GUI features providing user-friendly interface for working with the large, often confusing number of system values and parameters.

iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file.

Key Features

Cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats.

  • Specially designed for non-technical users
  • Enables SOX, HIPAA, and California Privacy Act compliance
  • Simple, intuitive audit parameter definition process
  • Full text explanations of audit types, fields, values, etc
  • Powerful query and report generator
  • Integrates with iSecurity’s Visualizer for BI

Audit offers the most powerful and flexible reporting features available today. It includes more than eighty ready-to-run queries and reports.

  • Query Wizard allows users to quickly and easily create audit reports without programming.
  • Queries employ robust selection criteria such as AND/OR, equal/not equal, greater/less than, like/not like, included in list, etc.
  • Only the information that you really need is included.
  • Report formats are fully customizable

The principal feature of Audit is its ability to examine and respond to security related events in real time. When the IBM i (OS/400) current audit settings detect an event, an entry is recorded in the security audit journal. At the same time, Audit looks for a real time detection rule for this event.

If such a rule exists, Audit records the event in a history log and optionally triggers an alert message or command script as specified by the rule definition. Action (sold as a separate product) performs these responsive actions.

The information also is passed to the SIEMs and it make the LOG records available for BI afterwards.

Based on Clients Experience

iSecurity Audit

Business Vertical: Finance & Trading.

Need: Compliance Cyber Security Regulations for Financial entities.

“Being able to do auditing in real time is a great advantage as every system in the company is secured and we have a global vision of our Cyber security.”

This very large European Trading Company needs to be able to respond to certain events in real time, in the case of security is been compromised.

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the following Form, our Sales Representatives will contact you as soon as possible.