Menu Close
Data infrastructure optimization software
Data integration and quality software
Data availability and security software
Cloud solutions


Detecting Fraudulent Activity on Your IBM i

Security best practices and compliance auditors require that you monitor IBM i server logs in real-time to detect security attacks and breaches. IBM i journals are the only source of audit information accepted by IBM i security and audit professionals as they contain a trail of access attempts, command line activity, access to sensitive data, changes to system objects and more. However, IBM i log files are stored in a proprietary format that is not compatible with other systems.

View this 15-minute webcast on-demand to learn the concepts needed for monitoring your IBM i for fraudulent activity, including:

  • Key IBM i log files
  • Identifying security incidents in log files
  • Consolidating IBM i log information under a common strategy with other platforms
  • Tradeoffs between do-it-yourself and third-party solutions