Search
Close this search box.

iSecurity Visualizer

Enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters.

It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge.

iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.

Key Features

Special functionality has been added to Visualizer to assist in visually analyzing User Profile attributes instantaneously!

  • Visualizer interfaces to iSecurity products such as Audit, Firewall, AP-Journal and FileScope to help in finding the “needle in the haystack” when investigating possible security breaches or other critical system activity.
  • This feature is especially useful to System Administrators and Help Desk personnel in managing and monitoring User Profile passwords, status, authorities and more.

iSecurity Visualizer  enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters.

It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge.

iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.

The user simply clicks to select filters and a 3D pie chart, or similar graphics, appears in moments and shows the exact breakdown by the selected criteria.

  • Extract the information you need for cross-correlation data analysis, comparison and investigation
  • Replaces time-consuming and error-prone batch job executions
  • Extract log data fitting your specific needs instantaneously
  • Quickly analyze and monitor important User Profile information such as passwords, disabled/enabled status, User Class, special authorities, etc.

Based on Clients Experience

iSecurity Visualizer

Business Vertical: Finance & Banking.

Need: Compliance Cyber Security Regulations for Financial Entities.

“Being able to audit in real time is a great advantage, as every system in the company is secured and we have a global vision of our Cyber security.

The information also is passed to the SIEMs. The LOG records are available for BI afterwards.”

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the following Form, our Sales Representatives will contact you as soon as possible.