This powerful audit tool can track individual users all the way down to the field level, providing unparalleled visibility into file-level activity.
Monitor and enforce your system's security configuration. Includes security configuration scanning and optional live reporting.
This stripped down version of our popular software firewall will log all network connected activity on your IBM i.
DECADES OF IBM i OS SECURITY EXPERTISE
Read the Security Tips blog
Journaling is an old feature with modern applications for mirroring data and tracking field level changes for audit purposes. We take a look at working with journals in IBM i ACS.