Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • ManageEngine OpManager Reviews & Ratings
    1,310 Ratings
    Company Website
  • LogicMonitor Reviews & Ratings
    1,038 Ratings
    Company Website
  • New Relic Reviews & Ratings
    2,556 Ratings
    Company Website
  • AdRem NetCrunch Reviews & Ratings
    151 Ratings
    Company Website
  • Uptime.com Reviews & Ratings
    274 Ratings
    Company Website
  • Paessler PRTG Reviews & Ratings
    694 Ratings
    Company Website
  • Uptrends Reviews & Ratings
    125 Ratings
    Company Website
  • Auvik Reviews & Ratings
    650 Ratings
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    42 Ratings
    Company Website
  • Site24x7 Reviews & Ratings
    717 Ratings
    Company Website

What is iSecurity Audit?

iSecurity Audit enhances the inherent auditing features of IBM i by offering continuous surveillance and detailed reporting on all activities occurring within the IBM i ecosystem. Through its capability for real-time detection, it swiftly identifies security incidents and meticulously logs pertinent information for subsequent review. The audit logs can be visually represented in intuitive graphical formats, accompanied by straightforward explanations for each log entry, which aids in the rapid assessment of statistical information. One of the standout attributes of this system is its functionality to trigger alerts or implement immediate corrective actions in response to identified security threats. Specifically tailored for non-technical users, including external auditors and managerial staff, iSecurity Audit is recognized as the only security auditing solution for IBM i designed with accessibility at the forefront. Moreover, this sophisticated auditing tool not only ensures the monitoring of real-time activities but also activates alerts and responses to potential security weaknesses, establishing itself as a vital asset. Additionally, it features an extensive report generation system that includes over one hundred customizable, pre-configured reports, guaranteeing that all aspects of security auditing requirements are thoroughly addressed. This comprehensive approach not only enhances security management but also empowers users to stay informed about the overall health of their IBM i environment.

What is CPTRAX for Windows?

File Activity Monitoring on Servers – Monitor who is creating, accessing, or transferring your files and directories, while also tracking changes to file permissions. Receive immediate notifications regarding critical file operations and contain malicious actions, such as ransomware attacks and mass file deletions. Automatically mitigate risks to your Windows servers by executing PowerShell scripts, allowing you to specify precise responses for various alerts and threats. Containment strategies could include: - Disabling the user responsible for the threat - Blocking the remote IP address associated with the threat Workstation File Activity Monitoring: Keep track of who transfers files to USB drives or other external storage devices. Monitor file uploads via FTP or web browsers and prevent file creation on USB or removable media. Get email alerts whenever a removable device is connected. Active Directory Monitoring – Maintain audit records and receive immediate alerts regarding significant changes in Active Directory, eliminating the need to navigate SACLs or Windows Event Logs. Server Authentication Monitoring: Observe authentications in Citrix sessions and Windows Servers, ensuring that all unsuccessful login attempts are logged and reviewed. Workstation Logon/Logoff Monitoring: Gain insight into user logon and logoff activities at workstations, which includes tracking locks, unlocks, and password changes, thereby enhancing overall security awareness. This comprehensive approach ensures that all user activity is recorded, providing a clearer picture of network interactions.

Media

Media

Integrations Supported

ALIP
Accenture Cloud Trade Promotion Management
IBM Cloud
IBM i
Meridian Global LMS
Proximity Insight
Splunk Enterprise
Syslog-ng
Trellix Data Encryption

Integrations Supported

ALIP
Accenture Cloud Trade Promotion Management
IBM Cloud
IBM i
Meridian Global LMS
Proximity Insight
Splunk Enterprise
Syslog-ng
Trellix Data Encryption

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Raz-Lee Security

Date Founded

1983

Company Location

United States

Company Website

www.razlee.com/ibmi-audit-report/

Company Facts

Organization Name

Visual Click Software

Date Founded

1999

Company Location

United States

Company Website

www.visualclick.com

Categories and Features

Categories and Features

Audit

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

Popular Alternatives

Corner Bowl Server Manager Reviews & Ratings

Corner Bowl Server Manager

Corner Bowl Software Corporation

Popular Alternatives

Corner Bowl Server Manager Reviews & Ratings

Corner Bowl Server Manager

Corner Bowl Software Corporation
CPTRAX for Windows Reviews & Ratings

CPTRAX for Windows

Visual Click Software
EventSentry Reviews & Ratings

EventSentry

NETIKUS.NET ltd