Syncsort Ironstream® in combination with the Splunk Enterprise Security application available on the Splunk® platform brings powerful levels of monitoring and control to an organization’s security needs. This document briefly describes how all manner of machine data generated by networks and endpoints across the enterprise — including z/OS systems — can give total visibility into threat indicators such as:
- Reducing mean-time-to resolution of system problems.
- Unusual movement of data.
- Authentication and access failures.
- Creation or deletion of users.
- All log-in activity.
- Changes to user security information, passwords, and access rights