• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • CCSS Helps Detects Fraud with New Database Monitor

    January 11, 2012 Alex Woodie

    It’s a well established fact that the majority of fraud reported by companies is not perpetrated by hackers coming in over the Net, but is actually the work of employees and other insiders with access to internal systems. Combating this type of fraud requires a multi-pronged approach, including strong security configurations and powerful tools. The IBM i world just got another fraud-fighting tool last month when CCSS announced the availability of its new database monitoring solution.

    The new database monitoring capabilities were delivered as part of QMessage Monitor (QMM) version 7, a major new release of CCSS’ real-time message monitoring software for the IBM i server. QMM has always had coverage for QAUDJRN, where many critical IBM i messages are displayed, and which provided a degree of security protection. But with version 7, QMM now gains a new database monitoring component that notifies IT managers in real time when unauthorized activity occurs in DB2/400 (DB2 for IBM i).

    Users can manage the new database monitoring capabilities in QMM verion 7 through this GUI.

    While the QAUDJRN coverage shows some attempts at fraud, IBM i shops will get a much more detailed picture of fraudulent activity with the new database monitor in QMM, CCSS says. With properly configured detection rules, the new database monitoring feature will show IT managers the exact users, files, libraries, and IP addresses that are involved in fraudulent activity.

    The new security capability will be useful for adding an additional layer of protection on particularly sensitive files, such as payroll and personal employee data, says CCSS product manager Paul Ratchford. “There’s tremendous value in being able to pin-point the exact files, libraries, users and IP addresses they are interested in,” he says in a press release. “Suspicious activity has no place to hide on the system.”

    The new software is configured by setting up client lists, behavior rules, and escalation lists. The client list can be a single IP address or a range of IP addresses. The behavior rules cover various activities that can be performed on an entire database file or a particular record (such as reading, writing, deleting, or updating); actions performed on file members; the setting of a library list; and using SQL to access DB2/400. Finally, the escalation lists control which IT manager gets notified when a breach is detected.

    When a breach is detected, the software kicks into action. CCSS gives the example of an unauthorized user who has selected all of the records in a payroll file. Soon after the user takes this action, QMM would send the IT manager an alert message that gives him details of the activity, including the user, action, file details, and job details. Additional information available includes the parameters and rules associated with the user and their client list, including the top three programs in the call stack and the SQL command actually run when SQL access is being used, CCSS says.

    All of this information is automatically generated soon after the actual breach, which makes QMM an effective tool for auditors as it reduces the time required to investigate possible breaches.

    QMM 7.0 is available now. For more information, see the vendor’s website at www.ccssltd.com.

    RELATED STORIES

    CCSS Targets Security Issues in ‘Best Practices’ Guide

    CCSS Digs Deeper Into the Audit Journal to Yield Clues

    CCSS Adds Syslog Support to QMessage Monitor/a>

    Love’s Likes CCSS for PCi

    CCSS Addresses SOX Requirements in QMessage Monitor

    CCSS Boosts Problem Resolution in QMessage Monitor

    Message Monitoring Software from CCSS Gets Tighter Security



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Databorough:  Get ready for modernization or upgrades with X-Analysis 9.5
    Guild Companies:  The All-Everything Operating System, by Brian Kelly, Price $35
    CCSS:  Achieving Lights Out Automation in an IBM i environment. Get the Best Practice guide

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    IBM Updates Software Inventory and Usage Tool Control Your Code, Control Your Costs And Destiny

    Leave a Reply Cancel reply

Volume 12, Number 1 -- January 10, 2012
THIS ISSUE SPONSORED BY:

Databorough
New Generation Software
Townsend Security
IntelliChief
RJS Software Systems

Table of Contents

  • CCSS Helps Detects Fraud with New Database Monitor
  • Zend Updates PHP Server Stack for IBM i
  • ARCAD Adds New Testing Features to ALM Suite
  • Linoma Adds Enterprise Features to MFT Software
  • Applied Logic Gives FEU New Printing and Zip Functions
  • RJS Goes Single Sign-On with i OS App
  • RPG & DB2 Summit: Skills Fitness for Modern IT
  • Beverage Company Taps IntelliChief for Forms Software
  • Infor Touts Growth, Makes an Acquisition
  • IBM Updates Software Inventory and Usage Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle