• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Above Security Takes i5/OS Log Aggregation to Heart

    December 11, 2007 Alex Woodie

    Above Security, a Canadian provider of security software and managed security services, recently announced that it now supports the System i with its flagship product, CSC2, or Center of Surveillance, Command, and Control. In fact, company officials report they were so impressed with the order and the level of detail in the i5/OS audit journal that they standardized their log collection and aggregation techniques for other platforms on the multi-user business server from IBM.

    Based near Montreal, Quebec, Above Security has been providing customers with IT security services since it was founded in 1999. In 2002, it launched its flagship product, CSC2, to enable customers to get the same level of IDS (intrusion detection system) capability as if the vendor were providing security as an outsourced service.

    CSC2 delivers three main capabilities: IDS, log management, and security vulnerability assessments. The solution is deployed on industry-standard, rack-mounted servers running a hardened Linux operating system and a stripped-down Postgres database. One or more of these servers are placed in the customer’s network, where they monitor key journals and logs for network activity. After the raw log and journal data has been filtered by the sensors, any pertinent information–such as a security breach or a problem in the log aggregation process–is bubbled up to the Web-based management console, where a security officer or systems administrator can take appropriate action.

    In 2004, Jean Coutu Pharmacies came to Above Security with a request. The company, a major player in the retail pharmacy industry on the East Coast of North America, needed a way to monitor, filter, and store the log data generated from its i5/OS server, and was having trouble getting its current vendors–including Computer Associates (as CA was known then) and IBM–to provide a solution.

    “It was our chance to make a play, which we did,” says Daniel Gaudreau, vice president of operations and technologies for Above Security. “We offered to co-develop with them a solution that would aggregate security journals from the AS/400 into an aggregation solution that we already had [CSC2]. We developed a solution that would track the audit journals, classify it, filter it, and retain only what was perceived as being sensitive changes, or a sensitive piece of information from a security perspective.”

    By early 2005, the i5/OS log-monitoring solution was ready to be piloted, and it went into production soon after. Since then, Above Security has sold the i5/OS solution to “four or five other customers.” The product has been proved in real-world environments, and has even been listed in the IBM solutions directory. However, only recently did the company complete all of the IBM requirements to obtain Advanced Business Partner status, and to gain certification for CSC2 on the System i.

    But Above Security went beyond getting a certificate. The company actually used what it learned from i5/OS’s journaling system to improve the way it accesses and interprets logs from other products, Gaudreau says.

    They key element is the continuity that exists in the System i’s logging architecture. There are 80- or 90-some fields in the QUADJRN, Gaudreau says, and complete and total consistency across them. That level of consistency impressed him.

    “Our solution for log aggregation was initially based only on Syslog,” he says. “With the advent of that co-development project that we had [with the customer], we introduced a new way to classify logs . . so that we can present that in a more user friendly way.”

    “Quite frankly, I think the AS/400 platform is quite unique in the way that they formulated the journal entries,” he says. “If you compare this to a Windows log for example, you’ll find that the positioning or the definition of the different message is not standard–there is no standard way to present the date or the actual event number, or stuff like that, which on the AS/400 is one of the key pieces, where the entry type is always in the same position, and all fields are keeping the same meaning throughout the logs. It inspired us for an idea, for an architecture, to come up with techniques to extend that concept to other platforms.”

    Currently, CSC2 only provides log management capability for the System i platform. The other two components–IDS and security vulnerability assessments–will probably not be coming to the System i platform any time soon, according to Gaudreau. “The standard line that we were given on intrusion detection on AS/400 is, due to the nature of the architecture of the iSeries, it’s like a fortress. It’s really hard to penetrate, and all traces of actual activity would be within the audit files.” So, in a way, CSC2 could detect an intrusion on a System i–it just wouldn’t provide real-time notification.

    Above Security serves mostly customers in Canada and the Caribbean. The company has clients in the United States, but they’re primarily regional offices of Canadian companies.

    CSC2 is available now for the System i. Pricing for the company’s managed security services (where the company installs and manages a sensor at the customer’s site) starts at $3,000 per month per sensor.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  Present your core System i applications in Outlook, Google and Notes
    COMMON:  Join us at the annual 2008 conference, March 30 - April 3, in Nashville, Tennessee
    NowWhatJobs.net:  NowWhatJobs.net is the resource for job transitions after age 40

    IT Jungle Store Top Book Picks

    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Asia/Pacific Region Bolsters Disk Array Sales in Q3 Use SQL User-Defined Functions to Avoid Data Repetition Problems

    Leave a Reply Cancel reply

Volume 7, Number 46 -- December 11, 2007
THIS ISSUE SPONSORED BY:

MKS
LANSA
Profound Logic Software
Krengeltech
Affirmative Computer

Table of Contents

  • Putting the ‘i’ Back Into PCI
  • Above Security Takes i5/OS Log Aggregation to Heart
  • Shield’s Remote Journal-Based DR Solution Matures at V2R1
  • Pat Townsend and BalaBit Pair Up to Cover System i Logs
  • m-Power Generates Consistent Reports Across the Board
  • Agilysys to Sell J.D. Edwards Apps for Oracle
  • IBM Adds iSeries Support to WebSphere Dashboard Framework
  • Group 1 Launches E-Mail Marketing Software
  • BOSaNOVA Earns Storage Proven Cert from IBM
  • Now’s the Time to Review Business Continuity Strategy, SunGard Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle