1 Visualizer for Audit Graphical Business Intelligence Display & Analysis Tool.

Slides:



Advertisements
Similar presentations
Welcome! Were Glad Youre Here!. Whats New In Version 5.1b-100 Welcome to The Annual Information & Records Associates, Inc. User Conference May 20, 2009.
Advertisements

Support.ebsco.com EBSCOadmin Reports & Statistics Tutorial.
Firewall End-to-End Network Access Protection for System i.
ISecurity GUI User-Friendly Interface. Features Full support of all green-screen functionality Simultaneous views of multiple iSecurity screens and activities.
Database Basics. What is Access? Database management system Computer-based equivalent of a manual database Makes it easy to organize and update information.
Process Monitoring is only the first step in improving process efficiency.
Efficient, Productive Solutions SECURITY SOLUTIONS for LAWSON SOFTWARE Part of our RISK MANAGEMENT SUITE FOR LAWSON S3 Thank you for taking the time to.
1 Authority on Demand Flexible Access Control Solution.
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
CSO’s 2014 Training & Networking Conference | Austin, TX | Copyright © 2014 CSO Research, Inc. Wonderful World of Data Cleanup Keenan & Mona.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
KYN Know Your Network A network rollout and infra-structure management tool 360Cellutions.
Authority on Demand Control Authority Rights & Emergency Access.
Hacking Capture Save and Playback User Session Screens.
1 Visualizer for Firewall Display & Analysis Tool.
TRACK 2™ Version 5 The ultimate process management software.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
1 General Reporting HRMS Reports There are two types of HRMS reports: Standard and Customized. Standard reports came with the SAP Software and relate to.
SYSLOG Real-Time Monitoring of System i Events. What is SYSLOG? Multi server environments are now the reality at most sites; however the number of operators.
TRACK 3™ The ultimate process management software.
1 Audit Next Generation Monitoring, Compliance & QAUDJRN Reporting.
1 System Control & MSGQ. 2 System Control & MSGQ Features Uses QSYSOPR or any application message queue data as input to iSecurity Action module Enables.
1 Password Reset Effortless, Self service User Password Reset.
Audit Next Generation Monitoring, Compliance & Reporting
1 Compliance Evaluator Single-View Overall Compliance Reports.
1 Action Automated Security Breach Reporting and Corrections.
AP-Journal Application Security & Business Analysis.
XP Information Information is everywhere in an organization Employees must be able to obtain and analyze the many different levels, formats, and granularities.
1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool.
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
Mastering Windows Network Forensics and Investigation Chapter 12: Windows Event Logs.
1 Authority on Demand Flexible Access Control Solution.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Firewall End-to-End Network Access Protection for IBM i.
1 Visualizer for Firewall Display & Analysis Tool.
1Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall. Exploring Microsoft Office Access 2010 by Robert Grauer, Keith Mast, and Mary Anne.
1 May 2011 Removing the Hay to find… iBi: IBM i Business Intelligence BI Datathe Needles.
1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
1 Action Automated Security Breach Reporting and Corrections.
Firewall End-to-End Network Access Protection for IBM i.
Learningcomputer.com SQL Server 2008 – Profiling and Monitoring Tools.
1 Visualizer for Audit Display & Analysis Tool. 2 Graphical presentation and analysis of Firewall data Graphical presentation and analysis of Audit data.
1 NetInsight Demonstration 10 October 2007
1 Authority on Demand Provide high authority “as-needed” with full Audit Trail.
By N.Gopinath AP/CSE Cognos Impromptu. What is Impromptu? Impromptu is an interactive database reporting tool. It allows Power Users to query data without.
Reporting and Analysis With Microsoft Office. Reporting and Analysis Business User Reporting & Analysis OLAP Data Warehouse.
1 PTF Tracker Automatic Tracking of PTFs and Software Changes.
0 / Database Management. 1 / Identify file maintenance techniques Discuss the terms character, field, record, and table Describe characteristics.
IST 220 – Intro to Databases Lecture 2 Touring Microsoft Access.
1 Assessment Comprehensive Analysis of IBM i Security.
1 Visualizer- Manager’s View. 2  Graphical presentation and analysis of Firewall data  Graphical presentation and analysis of Audit data  Immediate.
Microsoft Access By Ritesh Sharma. Introduction Microsoft Access is a desktop database program that enables you to enter, store, analyze,and present data.For.
1 View Record and Field-Level Security. 2 View – Database Environment Conceals sensitive field data from unauthorized users, with no modifications to.
Encryption DB2 Field Encryption for IBM i. The Need for Encryption PCI-DSS, HIPAA, FDA 21 CFR Part 11, and other regulations Use cases: Credit Card Numbers,
Syslog for SIEM Products Using iSecurity Real-Time Monitoring of IBM i Security Events.
TOPSpro Special Topics VI:TOPSpro for Instructors.
Anti Virus System i-Specific Anti-Virus Product
Introduction to Computing
Business Intelligence
Lessons Vocabulary Access 2016.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Net Report WMI Dashboard Summary
iSecurity AP Journal Training
Authority on Demand Control Authority Rights & Emergency Access
Kanban Task Manager SharePoint Editions ‒ Introduction
Presentation transcript:

1 Visualizer for Audit Graphical Business Intelligence Display & Analysis Tool

2 Visualizer Helps you Understand & Implement Security “With Visualizer, understanding and implementing security is easy!” 65 Or get an analysis of security data in graphical user-friendly format. …and create a security rule based on an actual event. 4 3 With Visualizer you can easily isolate a single event out of millions of log entries… 2 “To create a security rule, I have to actually write a program…” 1 “There are millions of log entries – it’s so hard to find a specific entry.”

3 Business Intelligence product for presentation, investigation and analysis of security warehouse log data and query output from: Firewall- to analyze network accesses Audit- to analyze QAUDJRN system journal events AP-Journal – to analyze the log of business-critical data fields which were accessed or changed User Profile Reports- to analyze all User Profile information Instantaneous “Slice & Dice” response, regardless of database size Pinpoints exceptions and trends, easily finds the “needle in the haystack” Visualizer Features

4 Nightly Maintenance Job Audit Statistics File Firewall Statistics File Firewall Audit Visualizer How Visualizer obtains Audit & Firewall Data Daily Log Files

5 Accessing Visualizer from the iSecurity GUI

6 Filter Audit Log Data No. of Entries on each Date Graphical display of most frequent Dates Visualizer’s workspace Lower tabs for “slice and dice’

7 Supports 3D/2D, Vertical and Horizontal Graphs

8 Visualizer Audit Example: Sort all Programs by Quantity, Select QCMD as Filter

9 Add filter for User QSECOFR

10 Add filter for System S520

11 Add filter for last 5 days

12 Add filter by unique iSecurity Entry Type User Profile Changed

13 Select Sub Type “User Profile Changed: STATUS (*ENABLED)”; note 2 entries selected Click “Drill to Data”

14 View 2 QAUDJRN records, select one and click on Create Detection Rule

15 Detection Rule pre-populated with data from actual QAUDJRN event

16 Print a Report in HTML

17 Please visit us at Thank You!