• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security and Auditing Breakthrough Gives Cilasoft Compliance Advantage

    May 25, 2010 Dan Burger

    Underestimating security issues and being unaware of the technology that makes systems more secure can be the dog you never thought would bite you until it did. The loss of sensitive data can hurt in many different ways. Regulatory compliance mandates have forced some IBM i-based companies to think about this, and software companies like Cilasoft are crafting new technology that can help. Cilasoft’s database monitoring software is a good example.

    The IBM i is not as secure as most people think. It’s a bank vault compared to some well-known and more vulnerable systems, but the system and its operators have their weaknesses.

    If you are familiar with the system, you understand it is possible to track and collect database modifications related to adds, changes, and deletes to a DB2 table. What it can’t identify is who is looking at data, and that’s a security breach that could be costly. Even though compliance standards have regulations in place for encryption of certain information (credit card numbers and Social Security numbers are two important pieces of info), much data remains to be seen by those who seek it.

    “From a privacy law standpoint, this is huge,” says Dan Riehl, the head of U.S. operations for the French company that’s looking to make a name for itself in the United States. “Cilasoft’s Database View Monitor for i is the only commercial product in the System i arena that does this. The PCI Data Security Standard, as one example, says you need to trace access to sensitive information, audit it, and report on it.”

    Riehl says there is a big hole in privacy and security of private information. As examples of compromised data that can affect a company, he notes that employees can access payroll information and production records.

    Cilasoft’s Database View Monitor identifies–by auditing the object–when files are accessed. It provides record-level information such as who was the user, what workstation was being used, what program was used to access the record, and the date and time the access occurred. It’s the same type of information that’s been available in logs that monitor add/change and delete events.

    Riehl says he’s been eagerly awaiting this product since hearing of the plans and design more than a year ago. He calls the tool “long overdue” for the IBM i market.

    One of the common goals of most regulatory compliance standards is to make sure certain data is encrypted. Riehl says a lot of companies haven’t gotten to that point yet.

    “When they do,” he says, “there will still be a need to see the access to sensitive data. Even if someone can’t read the encrypted data, because they don’t have the encryption key, there is other information with it–name, address, phone, and other private information.”

    Regardless of whether the data has been unencrypted, encrypted, or de-encrypted, companies will still want to identify records that have been accessed, Riehl says. And now that technology makes this available on the IBM i, he says auditors will ask that the technology be applied, as it is being done on other platforms.

    “It’s not a big technical challenge to build a tool to monitor database “view record” events on the i, but it is a huge challenge to build this tool in such an intelligent way that the performance metrics don’t outweigh the great benefit of the tool,” Riehl noted. “The development group at Cilasoft has tuned the performance of this software to the max.”

    Database View Monitor joins the newly upgraded Cilasoft Security Suite 5.0, which includes the products QJRN/400 and CONTROLER. The latest enhancements improve security, usability, and functionality, and the suite is compatible with the latest version of the IBM i/OS, which is 7.1.

    QJRN/400 is used for auditing database changes and for monitoring and reporting on events from the security audit journal (QAUDJRN) and other system journals. It has customizable filtering capabilities and an array of reporting and alerting capabilities.

    New reporting options include PDF output with customizable graphics, encryption, and password protection. It also has a colorized highlighter feature that allows selected fields within a report to be emphasized.

    In terms of new reporting and alerting features, QJRN/400 now has a pop-up window alert and a more secure method of sending reports via FTP. Reporting on security-related and database events to the SYSLOG format also has been updated and enhanced to allow system monitoring through a stand-alone SYSLOG console or enterprise event console.

    Cilasoft’s CONTROLER product provides customizable auditing and granular control of network transactions through FTP, ODBC, file transfer, DDM, and remote command. The company says it goes beyond the capabilities of standard exit program software because it monitors and controls the use of all Control Language commands and enforces rules for all command parameter usage. CONTROLER can also monitor and control the use of all SQL database access using tools like STRSQL, RUNSQLSTM, RUNQRY, and ODBC.

    Cilasoft also claims that CONTROLER is the only commercial exit point solution for the System i that can effectively audit and control Distributed Relational Database Access (DRDA) transactions across systems. According to Cilasoft, other exit point software packages only monitor the DRDA “Connect” function. CONTROLER audits and controls the entire DRDA session, including all SQL statements run during a DRDA connection.

    Riehl says Cilasoft is unique because it makes auditing and controlling interfaces highly customizable, yet doesn’t require a System i technical expert to configure them in order to get the monitoring and protection required in today’s heavily regulated environments. He notes that the version 5 release has extended the number of exit points that are covered.

    Database View Monitor for i, QJRN/400 version 5, and CONTROLER version 5 are all generally available. Each product is licensed separately, but is designed to work as an integrated environment. The product pricing is tier-based and begins at approximately $7,000 for use on a P05 box.

    Cilasoft originally developed its products in response to policies and procedures dictated by the International Monetary Fund. They are certified as “IBM Server Proven” and Cilasoft is an Advanced IBM Business Partner. The company has a network of international sales partners and has customers in more than 45 countries.

    For more information, visit www.cilasoft.com.

    RELATED STORIES

    New i OS Security Firm to Offer Multiple Wares, Services

    QJRN/400 Sniffs Out Fraud, One Journal Receiver at a Time



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    IBS:  Free e-book: The Six Margin Killers in Wholesale Distribution
    WorksRight Software:  ZIP codes, area codes, Canadian postal codes, CASS certification, and more
    COMMON:  Join us at the Fall 2010 Conference & Expo, Oct. 4 - 6, in San Antonio, Texas

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Catch the Wave: OCEAN Hosts 17th Annual User Group Meeting Five Steps To Monitoring Your Server Log on IBM i

    Leave a Reply Cancel reply

Volume 10, Number 20 -- May 25, 2010
THIS ISSUE SPONSORED BY:

ProData Computer Services
Bytware
RevSoft
IBS
VAULT400

Table of Contents

  • Security and Auditing Breakthrough Gives Cilasoft Compliance Advantage
  • DBU Now Accessible Over the Web
  • PowerTech Delivers Object-Based Control Over Exit Points
  • IBM Considers Offering Trials of RPG OA
  • Databorough Targets CA 2E Apps for Migration
  • IBM to Buy Sterling Commerce for $1.4 Billion
  • IBM Power System Powers IBM Power Systems
  • Software Helps Truckers Cope with CSA 2010
  • Halcyon Snaps Up Snapshot
  • Saudi Distributor Taps VAI for Logistics Improvement

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle