Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 2 Ratings

Total
ease
features
design
support

Alternatives to Consider

  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • Safetica Reviews & Ratings
    409 Ratings
    Company Website
  • Filecamp Reviews & Ratings
    174 Ratings
    Company Website
  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • ZenTreasury Reviews & Ratings
    9 Ratings
    Company Website
  • Venn Reviews & Ratings
    35 Ratings
    Company Website
  • CirrusPrint Reviews & Ratings
    2 Ratings
    Company Website
  • Synchredible Reviews & Ratings
    29 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • RegDesk Reviews & Ratings
    19 Ratings
    Company Website

What is iSecurity AP-Journal?

iSecurity AP-Journal is designed to protect crucial business information from both internal and external threats while keeping managers updated on any changes to information assets, which streamlines the IBM i journaling process. It carefully logs all activities, detailing who performed what actions, when they occurred, and which specific steps were taken. In contrast to standard IBM i journaling, this solution captures READ operations directly into journal receivers, making it essential for compliance adherence. It continuously monitors changes to objects, application files, and their members while also accommodating periodic structural modifications in application files. This tool allows for the tracking of application files during such updates and offers customizable routines tailored to specific field exits. Additionally, it provides instant notifications for alterations in critical business data, with alerts activated by user-defined thresholds. It also produces comprehensive reports that display all application changes on a singular timeline and in various formats, ensuring thorough monitoring of data integrity. This extensive reporting not only boosts transparency but also plays a crucial role in sustaining strong security measures across the organization. Ultimately, the robust capabilities of iSecurity AP-Journal contribute significantly to enhancing the overall security framework of the business.

What is Code42?

Welcome to the world of data protection designed specifically for remote and collaborative businesses. It’s essential to verify that officially sanctioned collaboration platforms, such as Slack and OneDrive, are utilized properly. Detect any unauthorized software that may indicate gaps in the corporate tools provided or in employee training programs. Gain a clear understanding of file actions taking place outside the corporate network, which includes web uploads and the use of cloud synchronization services. Promptly locate, investigate, and resolve cases of data exfiltration conducted by remote employees. Keep updated with alerts triggered by particular file characteristics, such as type, size, or quantity. Additionally, leverage detailed user activity profiles to improve the effectiveness of investigations and responses, thereby maintaining a strong security framework in an ever-evolving work landscape. This proactive approach not only safeguards sensitive data but also fosters a culture of accountability and awareness among team members.

Media

Media

Integrations Supported

ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
Box
Code42 Incydr
Cortex XDR
Dropbox
IBM Cloud
Imperva Advanced Bot Protection
Indent
Meridian Global LMS
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Trellix Data Encryption
iCloud

Integrations Supported

ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
Box
Code42 Incydr
Cortex XDR
Dropbox
IBM Cloud
Imperva Advanced Bot Protection
Indent
Meridian Global LMS
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Trellix Data Encryption
iCloud

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Raz-Lee Security

Date Founded

1983

Company Location

United States

Company Website

www.razlee.com/ap-journal/

Company Facts

Organization Name

Code42

Date Founded

2001

Company Location

United States

Company Website

www.code42.com

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Popular Alternatives

iSecurity Safe-Update Reviews & Ratings

iSecurity Safe-Update

Raz-Lee Security

Popular Alternatives

Assure Security Reviews & Ratings

Assure Security

Precisely
iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security