Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • Filecamp Reviews & Ratings
    175 Ratings
    Company Website
  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • ZenTreasury Reviews & Ratings
    9 Ratings
    Company Website
  • Venn Reviews & Ratings
    35 Ratings
    Company Website
  • CirrusPrint Reviews & Ratings
    2 Ratings
    Company Website
  • Synchredible Reviews & Ratings
    30 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • RegDesk Reviews & Ratings
    19 Ratings
    Company Website

What is iSecurity AP-Journal?

iSecurity AP-Journal is designed to protect crucial business information from both internal and external threats while keeping managers updated on any changes to information assets, which streamlines the IBM i journaling process. It carefully logs all activities, detailing who performed what actions, when they occurred, and which specific steps were taken. In contrast to standard IBM i journaling, this solution captures READ operations directly into journal receivers, making it essential for compliance adherence. It continuously monitors changes to objects, application files, and their members while also accommodating periodic structural modifications in application files. This tool allows for the tracking of application files during such updates and offers customizable routines tailored to specific field exits. Additionally, it provides instant notifications for alterations in critical business data, with alerts activated by user-defined thresholds. It also produces comprehensive reports that display all application changes on a singular timeline and in various formats, ensuring thorough monitoring of data integrity. This extensive reporting not only boosts transparency but also plays a crucial role in sustaining strong security measures across the organization. Ultimately, the robust capabilities of iSecurity AP-Journal contribute significantly to enhancing the overall security framework of the business.

What is Powertech SIEM Agent for IBM i?

Maintain vigilant surveillance of your IBM i to quickly identify critical security incidents and receive immediate alerts, empowering you to respond promptly—before valuable business information is lost, corrupted, or put at risk. Security incidents can be directly communicated to your enterprise security monitor, providing improved oversight. By integrating seamlessly with your security information and event management (SIEM) system, Powertech SIEM Agent simplifies the process of monitoring security and system integrity. You have the ability to monitor security events across the network, operating system, and any journal or message queue in real-time, allowing for the tracking of user profile changes, system value modifications, unauthorized access attempts, intrusion notifications, and the alteration or deletion of objects. Staying updated on every security event in real time ensures that potential threats are never overlooked. With Powertech SIEM Agent for IBM i, you will receive prompt notifications that emphasize critical security concerns, enabling a swift reaction. This thorough monitoring strategy not only strengthens your security framework but also plays a pivotal role in preserving the integrity of your business processes. Ultimately, safeguarding your data and infrastructure can lead to greater confidence in your organization's overall security strategy.

Media

Media

Integrations Supported

ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
IBM Cloud
IBM Tivoli Monitoring
IBM i
Imperva Advanced Bot Protection
LogRhythm SIEM
Meridian Global LMS
OpenText Enterprise Security Manager
Proximity Insight
Splunk Enterprise
Trellix Data Encryption

Integrations Supported

ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
IBM Cloud
IBM Tivoli Monitoring
IBM i
Imperva Advanced Bot Protection
LogRhythm SIEM
Meridian Global LMS
OpenText Enterprise Security Manager
Proximity Insight
Splunk Enterprise
Trellix Data Encryption

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Raz-Lee Security

Date Founded

1983

Company Location

United States

Company Website

www.razlee.com/ap-journal/

Company Facts

Organization Name

Fortra

Company Location

United States

Company Website

www.fortra.com/products/security-and-integrity-monitoring-software-ibm-i

Categories and Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

iSecurity Safe-Update Reviews & Ratings

iSecurity Safe-Update

Raz-Lee Security

Popular Alternatives

ZeroHack SIEM Reviews & Ratings

ZeroHack SIEM

WhizHack
Assure Security Reviews & Ratings

Assure Security

Precisely
TeskaLabs SIEM Reviews & Ratings

TeskaLabs SIEM

TeskaLabs
iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security