Search
Close this search box.

iSecurity System Control

First of all, iSecurity System Control is a module for system monitoring. It is supplied with system information via the functions of the iSecurity Audit module.

In this way, System Control can be used to monitor important system functions such as CPU usage, jobs, subsystems, disk storage and message queues.

When the iSecurity Action module is installed, problems defined via filters can be discovered in real time, detected in real time and remedied with appropriately adapted countermeasures. This usually happens in good time before serious damage occurs.

Key Features

System Control monitors both arbitrary message queues as well as the system history (QHST) cyclically or in Real time.

Existing messages in the system can are used to easily set up rules that are processed automatically. The SIEM interface is used to create higher-level System supplied with IBM i information.

  • Monitors alongside message queues also the history (QHST)
  • Finds abnormalities in the system (not running jobs, inactive ones subsystems, etc.) and fixes them with rule-based logic
  • Identifies messages in any message queues
  • Able to send messages automatically and answers based on rules

It is possible to send rule-based warning messages via E-mail, SMS, Message queue, Syslog, etc. to those responsible, as well as to execute corrective command scripts with your own or standard IBM i commands.

  • Uses entries from QSYSOPR or other message queues as input for iSecurity System Control
  • Identifies jobs or sub-systems that are not active within production times and restarts them automatically
  • Find not active jobs and forward the information to administrators e.g. via Email
  • Allows corrective or preventive actions on Real-time monitoring security-related events
  • Identifies critical events related to changes on CPU, disk storage and other parameters from system status
  • Identifies unusual or extraordinary System behavior (e.g. such, not with behavioral patterns in WRKACTJOB)
  • Allows rule creation Based on occurring messages in the system

Based on Clients Experience

iSecurity FileScope

Business Vertical: Finance & Banking.

Need: Have a fast way to review System Status.

“Our System i professionals like this module very much, its easy and we can review the status of every IBM i at our company in seconds.”

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the folowwing Form, our Sales Representatives will contact you as soon as possible.