Assure Monitoring & Reporting

Powerful Auditing of IBM i System & Database Activity

Comprehensively monitors system and database activity to save you time and money on achieving regulatory compliance.

Description

In response to today’s world of complex regulatory requirements and evolving security threats, you need a simple way to monitor all IBM i system and database activity, quickly identify deviations from compliance or security best practices, and maintain an audit trail to satisfy security officers and auditors.

Assure Monitoring and Reporting, a feature of Assure Security, and part of its Assure Compliance Monitoring feature bundle, comprehensively monitors system and database activity to save you time and money on achieving regulatory compliance, identifying compliance deviations and detecting unauthorized activities on IBM i systems. Assure Monitoring and Reporting produces clear, concise, easy-to-read reports based on system activity and database changes recorded in journals – the only source of audit information accepted by IBM i security and audit professionals. Best of all, no application modifications are required.

Features

Reports can be ad hoc, or they can be scheduled and emailed automatically to the people who need them. Assure Monitoring and Reporting can optionally integrate with a SIEM console for monitoring database events, system events or system information alongside other enterprise systems.

Assure Monitoring and Reporting is comprised of two modules, the System Module and the Database Module, which can operate independently or together.

System Module

The System Module comprehensively monitors your system to report on changes to system objects, access attempts, powerful user activity, command line activity, access to sensitive data, and more.

Database Module

The Database Module produces reports and alerts for any database activity on the IBM i. Static system data sources are also analyzed to identify possible deviations from best practice.