Assure Monitoring and Reporting for IBM i
In response to today’s world of complex regulatory requirements and evolving security threats, you need a simple way to monitor all IBM i system and database activity, quickly identify deviations from compliance or security best practices, and maintain an audit trail to satisfy security officers and auditors.
Assure Monitoring and Reporting, a feature of Assure Security, and part of its Assure Compliance Monitoring feature bundle, comprehensively monitors system and database activity to save you time and money on achieving regulatory compliance, identifying compliance deviations and detecting unauthorized activities on IBM i systems. Assure Monitoring and Reporting produces clear, concise, easy-to-read reports based on system activity and database changes recorded in journals – the only source of audit information accepted by IBM i security and audit professionals. Best of all, no application modifications are required.
Powerful Auditing of IBM i System and Database Activity
Reports can be ad hoc, or they can be scheduled and emailed automatically to the people who need them. Assure Monitoring and Reporting can optionally integrate with a SIEM console for monitoring database events, system events or system information alongside other enterprise systems.
Assure Monitoring and Reporting is comprised of two modules, the System Module and the Database Module, which can operate independently or together. Assure Monitoring and Reporting’s System Module comprehensively monitors your system to report on changes to system objects, access attempts, powerful
user activity, command line activity, access to sensitive data, and more. The Database Module produces reports and alerts for any database activity on the IBM i. Static system data sources are also analyzed to identify possible deviations from best practice.