Meeting Archive:
Monitoring and Reporting on IBM i Compliance and Security


Meeting Description:

 

Today’s world of complex regulatory requirements and evolving security threats requires you to find simple ways to monitor all IBM i system and database activity, identify security threats and compliance issues in real time, produce clear and concise reports, and maintain an audit trail to satisfy security officers and auditors.

IBM i log files and journals are rich sources of system and database activity. However, they are in their own proprietary format, and they are not easy to manually analyze for security events. Join this webinar to learn more about:

  • Key IBM i log files and static data sources that must be monitored
  • Automating real-time analysis of log files to identify threats to system and data security
  • Integrating IBM i security data into SIEM solutions for a clear view of security across multiple platforms
 
Details
Date: Thu, Sep 12, 2019
Time: 02:00 PM EDT
Duration: 1 hour
Host(s): Syncsort