Menu Close
Data infrastructure optimization, availability & security software
Data integration & quality software
The Next Wave of technology & innovation


Security 101: IBM i Security Auditing and Reporting

IBM i journals and logs are the trusted source of audit information accepted by IBM i security and audit professionals as they contain a trail of access attempts, command line activity, changes to sensitive data, changes to system objects and more. However, IBM i log files contain massive amounts of data - and they are difficult to setup, report and alert on.

View this webcast on-demand to learn more about key topics such as:

  • Key IBM i logs
  • Auditing and monitoring for security incidents
  • Leveraging 3rd party solutions that analyze security data
  • How Syncsort can help