Kisco Systems

IBM i Security Tips

Home : Blog : Monitoring


Snooping On Critical Files

A trigger program is nothing more than a standard IBM i/OS *PGM object. When it is associated with a *FILE, the OS will call the program according to the instructions you provide with the trigger file registration.

Read more

Monitoring For Security Events

Depending on the size of your shop and the number of users, there could be hundreds or even thousands of security decisions being made by your security setup on a minute by minute, hour by hour, day by day basis. If you've done your homework well, those security arrangements will all work to protect your data from being used incorrectly.

Read more