• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Kisco User Auditing Tool Casts a Wider Net

    October 5, 2010 Alex Woodie

    “Trust, but verify.” Former president Ronald Regan was referring to the Soviet Union when he made that remark more than 20 years ago. But the idea applies just as well to the sometimes rocky relationship between employers and the people who are paid to run the business. For companies that rely on the IBM i server to manage data, a new DB2/400 auditing tool from Kisco Information Systems can go far trusting employees to do their jobs, while verifying that they aren’t sampling sensitive data on the side.

    There is no way around the fact that, to some extent, companies simply have to trust their employees not to steal from them. That doesn’t mean that petty cash gets stored next to the coffee machine, or that every worker gets full access to the company database on their very first day. Leaving things so far out in the open would just be asking for trouble.

    But the opposite of full and complete trust doesn’t work, either. It is possible to configure IBM i security in such a way that it’s completely locked down, and workers have practically no access to any sensitive data. Some access controls are obviously necessary, but an excessive amount can make a system too cumbersome to use for the 99 percent of employees who are honest and just want to do their jobs. It usually doesn’t make financial sense to hamstring a business system simply to prevent 1 percent from dipping their hands in the cookie jar.

    A good security policy doesn’t necessarily eliminate all potential ways that a company can be victimized. Instead, a good security policy will identify all of the risk factors, at which point it’s up to the owners and managers to decide what to do about it. In some cases, they will decide that no risks can be taken, and the path is buttoned up. In other areas, compromises must be made for the sake of doing business.

    This is where trust, but verify comes in. IBM i shops must trust employees with access to some customer records if they’re going to provide good service to those customers. But, there is always the possibility that employees can go rogue, and will use their access to business systems as part of a scheme to defraud organizations.

    Rouge employees could be scrolling through customer records in search of old or inactive customer accounts, which they will hijack for their own means. Or maybe they’re looking for customers with heavy sales volume, with the idea that they’ll surreptitiously add a few items to an order. Whatever they’re up to, it’s bad. But a company is not powerless to stop it.

    There are a host of good security tools for IBM i that would tell administrators that something’s amiss in these types of situations. One of these is Kisco’s iFileAudit.

    Traditionally, iFileAudit has only been able to track certain activities in DB2/400, including additions, deletions, and changes to files, records, and fields. In addition to identifying these changes, the product tells the user about the user profile, the program, the location, or the job involved in the change made to the data, giving auditors a complete picture of activities surrounding IBM i data.

    With iFileAudit Release 4, Kisco added the capability to detect reads of files, records, and fields. This is a powerful new feature that will be able to detect that rouge internal user who is browsing through company information without making changes.

    Release 4 also brings a series of filters that tells the product which types of file read activities to look for, and which ones to ignore. Most file read activity is harmless, and tracking it all would be pointless and consume hardware resources unnecessarily. Filters can be based on user profile, job name, or type of job (batch or interactive). For performance reasons, only the record ID is captured by iFileAudit when doing read activity tracking, Kisco says.

    Another handy new feature is the capability for authorized end users without security officer clearance to access iFileAudit to create and print reports. This eliminates the need to give visiting auditors QSECOFR user profiles to audit systems. Users accessing iFileAudit reports as guests are not allowed to modify the utility in any way.

    iFileAudit Release 4 is available now. Pricing starts at $1,295 for a single LPAR, or $2,195 for an unlimited number of LPARs on a single server. For more information, see www.kisco.com.

    RELATED STORIES

    Kisco Gives i OS Auditing Tool a Web Makeover

    Kisco Tracks Database Changes with iFileAudit



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Help/Systems:  FREE Webinar. Oct. 7, 9 a.m. CST. Robot/REPORTS: Satisfy Your Audit Requirements
    System i Developer:  RPG & DB2 Summit in Minneapolis, October 12-14 for 3 days of serious training
    COMMON:  Join us at the 2011 IT Executive Conference, May 1-3, in Minneapolis, MN

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Eyebrows Go Up as HP Hands the Reins to Former SAP CEO Automate E-Mail Operations with Outlook and VBA

    Leave a Reply Cancel reply

Volume 10, Number 35 -- October 5, 2010
THIS ISSUE SPONSORED BY:

Vision Solutions
Bytware
Profound Logic Software
RevSoft
VAULT400

Table of Contents

  • ExaGrid Delivers IBM i Support with D2D Backup Solution
  • UNIT4 CODA Touts Financial App on IBM i
  • Bug Busters Adds ‘Self-Awareness’ Feature to HA Software
  • Kisco User Auditing Tool Casts a Wider Net
  • SkyView Launches New Auditing Tool
  • CCSS Digs Deeper Into the Audit Journal to Yield Clues
  • SugarCRM and i365 Expand Partner Programs
  • Fruit Distributor WOWed with Java Report Writing Software
  • Crossroads’ SPHiNX Now Offers Backups of Desktops
  • Tango/04 Touts International Sales

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle