• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • CCSS Adds Syslog Support to QMessage Monitor

    July 21, 2009 Alex Woodie

    System i shops that rely on the QMessage Monitor from CCSS to automate the handling of System i messages can now export those messages to third-party products as a result of the recently announced support for the Syslog message format. This will give QMM customers the capability to use cross-platform security event and information management (SEIM) products to keep watch over their entire IT environment, among other uses.

    QMessage Monitor is a message management solution for single- and multi-site OS/400, i5/OS, and IBM i OS implementations. The software constantly watches a variety of system messages, logs, and journals so operators don’t have to and provides a range of filtering options to ensure that the most critical messages are brought to somebody’s attention, via the Windows-based console or through paging and alerts, while escalation procedures ensure a response to critical messages.

    It’s been a while since QMM was updated, the last release being version 6.064 in the spring of 2007. Now, with the release of version 6.073, CCSS is helping its customers by enabling the product to route System i messages outside the product using Syslog. This new features should be a boon for System i shops that are struggling with managing the System i server in conjunction with other platforms.

    Syslog is a standard for forwarding log messages in an IP network. While Syslog is the most widely supported protocol for sharing messages generated by a range of servers, it is not supported natively in i OS. This has provided work for third-party security management vendors, who have developed connectors for converting richly detailed i OS operational and security messages into the Syslog format.

    While the System i often generates more security-related messages than other platforms, the messages are somewhat cryptic to the uninitiated and can be hard to share off-platform. This creates a liability for organizations that aim to manage the security for all platforms from a central point using an overarching SEIM product.

    Now, with the capability to generate Syslog content, QMM can help customers to move relevant security and operational messages from the System i to a SEIM product. QMM is well positioned for this role, thanks to its advanced filtering mechanisms to suppress the minor and unimportant messages and amplify the most important and critical. This will help to ensure that the “talkative” nature of the System i messaging system does not overwhelm the SEIM product and drown out messages with potentially serious ramifications.

    The addition of Syslog to QMM gives customers greater flexibility in how they use the product, says CCSS product manager Paul Ratchford.

    “Part of the underlying equation for any messaging solution is not only the types of messages that are being generated, but also, how they are delivered,” he says in the announcement. “With each company and [piece of] network environment, the needs are unique, so we need to provide the maximum number of choices so customers can tailor the delivery to suit their resources, shift patterns, and communications preferences. The addition of Syslog is a good example of how we’re always looking at both sides of that equation and seeing how we can do more, and better, for our customers.”

    QMM version 6.073 is available now. Pricing was not disclosed. For more information, visit the company’s Web site at www.ccssltd.com.

    RELATED STORIES

    Love’s Likes CCSS for PCi

    CCSS Addresses SOX Requirements in QMessage Monitor

    CCSS Boosts Problem Resolution in QMessage Monitor

    Message Monitoring Software from CCSS Gets Tighter Security



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Tune in to Profound Logic TV for FREE educational videos and tips
    Maximum Availability:  *noMAX - Subscription edition now available (US & UK)
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Pat Townsend Secure with New President Circumventing Two Limitations of CPYTOIMPF

    Leave a Reply Cancel reply

Volume 9, Number 28 -- July 21, 2009
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
Maximum Availability
Linoma Software
Tri-Delta Resources

Table of Contents

  • IBM Kills Secure Perspectives Tool
  • Bicycle Seller Rolls with Electronic Vaulting Backup and DR from UCG
  • JDA Shares Plans for E3 Fulfillment Products
  • Quadrant Adds a Slew of Updates to Forms Software
  • Kisco Gives i OS Auditing Tool a Web Makeover
  • CCSS Adds Syslog Support to QMessage Monitor
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization
  • Rimini Street Gets Equity Investment from Adams Street
  • Zobrist Offers Search-Friendly URLs for WebSphere Commerce
  • AIG-Israel Taps Raz-Lee for i OS Security Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9
  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.