iSecurity AP-Journal

By providing a timeline report of all changes relating to application data, iSecurity AP-Journal reduces unauthorized activity and enables users to meet regulatory requirements.

iSecurity AP-Journal also issues real-time alerts to inform managers of any changes in application databases or unapproved access to critical data.

iSecurity AP-Journal report data can include key fields, description fields and modified fields (highlighted).

Key Features

With its unique technology, iSecurity AP-Journal logs database access (READ operations) directly into the journal receivers. This functionality, which OS/400 journaling does not provide, constitutes an important component of compliance.

  • READ operations selectively added to Journal, for compliance with PCI requirements
  • Addresses PCI, SOX, HIPAA, etc. requirements

Users can integrate information from various files and view all changes relating to a specified business item, monitoring in real-time or in demand to have traceability of every action taken on the database. In addition, iSecurity AP-Journal helps enforce business rules by triggering external functions.

iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance.

Request Demo

Please fill the folowwing Form, our Sales Representatives will contact you as soon as possible.

Resources

Download Presentation

Download Datasheet