1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Micro Control Solutions Stability System II rev. 6.4
Business Development Suit Presented by Thomas Mathews.
With Folder HelpDesk for Outlook, support centres and other helpdesks can work efficiently with support cases inside Microsoft Outlook. The support tickets.
1 Central Administration Advanced Management of Multiple Systems.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
1 Authority on Demand Flexible Access Control Solution.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
1 Visualizer for Audit Graphical Business Intelligence Display & Analysis Tool.
Manufacturing Productivity Solutions Management Metrics for Lean Manufacturing Companies Total Productive Maintenance (T.P.M.) Overall Equipment Effectivity.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
HORIZONT 1 ProcMan ® The Handover Process Manager Product Presentation HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
1 Audit Next Generation Monitoring, Compliance & QAUDJRN Reporting.
A Product of Event Management, Register, Schedule & Report Entire Back to Back Event Management Solution Copyright © ANGLER.
ITIL: Why Your IT Organization Should Care Service Support
1 Password Reset Effortless, Self service User Password Reset.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Xerox ® ConnectKey™ for SharePoint ® Simple, Smart and Flexible Workflows BR4266 SO1PA-13UA.
Integrate your people maximize your knowledge Tel SalesBase Customer.
1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
The Harris-MSI Report Navigator Webinar. 2 The Harris/MSI Report Navigator “Learn about the details of the Harris/MSI Report Navigator. This exciting.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Information Systems Security Computer System Life Cycle Security.
1 iSecurity GUI for User Management. 2 Internationally renowned IBM i solutions provider Founded in 1983, 100% focused on IBM i Corporate offices in:
Segregation of Duties for Infor-Lawson Software 1.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Highlights Builds on Splunk implementations – extending enterprise value to include mission-critical IBM mainframe data. Unified mainframe data source.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
PaySmart A compendium of the major features. [A multi-functional administrative, client management and sales solution]
Module 7: Fundamentals of Administering Windows Server 2008.
Firewall End-to-End Network Access Protection for IBM i.
Audio Dial In: or CRM to RM Visual CRM to MS-CRM 2007 Visual User Group Nov 21 st 2007.
1 May 2011 Removing the Hay to find… iBi: IBM i Business Intelligence BI Datathe Needles.
1 Action Automated Security Breach Reporting and Corrections.
Configuration GRC & Oracle Configuration Controls Governor May 2009 Oracle GRC Strategy – Barry Greenhut.
Firewall End-to-End Network Access Protection for IBM i.
1 Authority on Demand Provide high authority “as-needed” with full Audit Trail.
1 Anti Virus IBM i Anti-Virus Product. 2 Reality of Virus, Worms Malware.
1 PTF Tracker Automatic Tracking of PTFs and Software Changes.
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.
Microsoft Management Seminar Series SMS 2003 Change Management.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
AvaTax ST The fastest, easiest, most accurate and affordable way to calculate and file sales and use taxes.
A compendium of the major features. A multi-functional administrative, patient management and sales solution for health organisations.
Surveillance is The First Step to Solving the Problem.
Forms Manager. What is Forms Manager? Forms Manager is a completely new online form creation and form data management tool.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Unit 10 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/24/2016 Instructor: Williams Obinkyereh.
A software development company especially related with development of software in education sector. DEN has a highly interactive and user friendly interface.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
Syslog for SIEM Products Using iSecurity Real-Time Monitoring of IBM i Security Events.
SQL Database Management
REDCap General Overview
Software Project Configuration Management
ITIL: Why Your IT Organization Should Care Service Support
Planning a Group Policy Management and Implementation Strategy
ITIL: Why Your IT Organization Should Care Service Support
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
ITIL: Why Your IT Organization Should Care Service Support
iSecurity AP Journal Training
SysKit Security Manager
Authority on Demand Control Authority Rights & Emergency Access
Presentation transcript:

1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker

2 Internationally renowned IBM i solutions provider since 1983 Product lines: iSecurity Infrastructure Security iSecurity Application Security System tools: file editor, performance tuning NEW! Database access software (patent pending)- Fits all the above product lines Products installed in over 35 countries, more than 12,000 licenses Worldwide distribution network IBM Advanced Business Partner Partnerships and product integration with major global security (SIEM) providers: IBM (including Tivoli and Q1Labs), HP, RSA enVision, GFI, Imperva, Splunk,… About Raz-Lee Security

3 The Need for Change Management Changes in production libraries can adversely affect company business Such changes auditing is currently enforced (answered by CMS or manual logs in notebooks or Excel) Standard Change Management System (CMS) solutions are problematic: Expensive Complex to implement Not feasible for SMBs Not “bullet proof” (depended on obedience to procedures)

4 What is Change Tracker? Change Tracker is a product which automatically tracks changes in production libraries No human intervention is required It tracks the changes in Real-Time The product reads the QAUDJRN in Real-Time (like Vision, Mimix etc.) Periodic mode is also available Green version + GUI (Java on Eclipse) of outputs ready Notes: Periodic Mode is for customers which do not log to QAUDJRN The rest of this presentation concentrates on the Real-Time mode

5 Real-Time Mode: How it Works Changes to production files are accepted at real time from QAUDJRN Changes identified as effecting production libraries are considered Changes are tracked for: Native libraries IFS Directories, Documents Folders System libraries (PTFs) Object info retrieved (modules in ILE, *OWNER/*USER authority) Source used for the object & related information are saved by CT Optional tracing of activity in source file is tracked The result is that Change Tracker has: Full information about the transaction Full information about the object Backup of the contributing sources

6 Change Tracker Dedicated to monitoring and logging object changes Especially those made to production libraries At both the source and object levels Relies solely on the actual updates within a library No manual intervention is required Based on the QAUDJRN system journal Robust and comprehensive solution that cannot be bypassed Working in real-time, it can automatically record every revision Collects all information relevant to the modifications made

Automatic Identification CT automatically identifies: The environment of the change (e.g. JDE-TEST) The project that the change belongs to (e.g. REL-11.2) The native object attribute (e.g. RPGLE, DSPF) The IFS object attributes (e.g. ZIP/TAR, C) For system object – the License Product, PTF ID (or violations) The executor (e.g. ALDON) The automatic identifications can later be modified As per the executor the product may skip farther processing for known CMS

8 Reports: Report Generator Full set of reports provided with the product All created by the Report Generator & Scheduler (included) Comprehensive filtering, sorting, distinct values only Output *, *PRINT, OUTFILE, GUI HTML, PDF, CSV with support Comprehensive filtering, sorting, distinct values only Scheduler Multi LPAR consolidated reporting (with Central Admin) Report carries full explanation for auditor, statistics, list of LPARS included

9 Benefits to the Organization Management Tracing activities Zero time implementation No procedure change Auditors Traces 100% of changes Even those done without CMS All changes: Native, IFS, PTF Programming Interface to PDM Auto backup Compare sources Restore source with original date and time

10 Change Tracker vs. Change Management System (CMS) Feature Change TrackerCMS Track activityAutomaticHuman responsibility, error prone Full tracking100%No Cost7K30K+ ImplementationImmediateLong, Complex Auditor interactionby

11 Ensures the auditability and validity Changes within production libraries which cannot be circumvented as may occur when using a CMS Very rapid implementation Enables organizations to install, configure, implement and quickly benefit Full tracking of all change details Including creation, deletion, modifications, etc., ensures total accountability and transparency Instant status report generation Adds to auditor's productivity and throughput Change Tracker is competitively priced Major Change Tracker Benefits

12 Potential market Large companies with ALDON - as complementary product with CMS - as complementary product (+ foot in the door) without CMS - as initial “poor man’s” CMS product + foot in the door SMBs Change Tracker is the only affordable & manageable product Should raise awareness for need of CMS

13 Thank You Please visit us at