compliance-et-audit-reporting Created with Sketch. Datasheet (Compliance)

Today’s security requirements can overwhelm even the most organized IT department. Sarbanes-Oxley (SOX) and Payment Card Industry (PCI) auditors demand proof of compliance on critical systems. Compliance Monitor™ eases the burden of compliance, letting programmers, analysts, and system managers return to revenue-producing projects.

Simplified Audit Reporting

Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Its easy-to-use web interface lets you select, run, and view the reports you want to see, including:

  • System Values 
  • User Profiles  
  • Object Authorities  
  • Security Audit Journal (QAUDJRN) log data  
  • HelpSystems Network Security Log Data (FTP, ODBC) 
  • HelpSystems Authority Broker Log Data (privileged users)

Consolidated Reporting

All report types can consolidate data from multiple systems into single reports to make it easier to review reports and compare systems.

SOX and PCI Compliance

Compliance Monitor includes a recommended set of compliance reports and explains IBM i concepts for auditors and security staff. An interactive Compliance Guide maps security issues to common industry frameworks and standards like COBIT, PCI, and ISO 27002 (17799).

Gaming (MICS) Reporting

Compliance Monitor provides a set of reports designed to help you meet Minimum Internal Control Standards (MICS) gaming compliance reporting guidelines.

Customized Reporting

Compliance Monitor lets you define and display just the information you need. Flexible filters allow you to generate the reports that you and your auditors want (including SQL queries) at a lower cost than developing and writing custom code.

 

“Compliance Monitor handles all our reporting requirements, and being able to design, test, and use our own reports is great. We use it to specify our own security policy and cross check against it automatically—that's the great feature that really makes sense.” –Paul Ballew Data Processing Incorporated Sr. Vice President and IT Manager

Policy Exceptions

You can decrease report review time dramatically by showing only exceptions to policy. The default policy included with Compliance Monitor is based on HelpSystems-recommended best practices. You can easily create customized policies for your organization, or for each system.

PDF, Excel, and CSV Export

You can export Compliance Monitor reports to Adobe PDF, Microsoft Excel, or comma-separated value (CSV) formats.

Compressed Audit Journal Storage

With Compliance Monitor’s innovative log aggregation architecture, audit journal data is stored compressed (up to 95%) on a central consolidator system. You can store months of audit records without using extra disk space. For example, you can effectively monitor all 74 IBM-type T events from QAUDJRN, including common events, such as:

  • Object changes, reads, creations, deletions  
  • User profile changes  
  • Commands used  
  • User and password login failures 
  • System value changes

Batch Assessments

Schedule your assessments to run at regular times and distribute the reports to selected recipients automatically

System Groups

By arranging systems in logical groups, you can launch assessments of multiple servers with one command.

Scorecard Reports

Management can track compliance status for each system using a one-page scorecard view with numerical ratings.

 

Let’s Get Started

Find out what Powertech Compliance Monitor for IBM i can do for you. We’ll review your current setup and see how HelpSystems products can help you achieve your security and compliance goals.

PRODUCT SUMMARY

KEY FEATURES

  • Simplified configuration reporting 
  • Audit journal reporting  
  • Compliance guide maps security issues to common security standards  
  • Custom reports and filters  
  • Report scheduling and distribution 
  • Exception-based reports 
  • Compressed audit journal storage

SYSTEM REQUIREMENTS

  • IBM i 7.1 or higher

PDF VERSION 

PRODUCT SUMMARY

KEY FEATURES

  • Simplified configuration reporting 
  • Audit journal reporting  
  • Compliance guide maps security issues to common security standards  
  • Custom reports and filters  
  • Report scheduling and distribution 
  • Exception-based reports 
  • Compressed audit journal storage

SYSTEM REQUIREMENTS

  • IBM i 7.1 or higher

PDF VERSION 

Today’s security requirements can overwhelm even the most organized IT department. Sarbanes-Oxley (SOX) and Payment Card Industry (PCI) auditors demand proof of compliance on critical systems. Compliance Monitor™ eases the burden of compliance, letting programmers, analysts, and system managers return to revenue-producing projects.

Simplified Audit Reporting

Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Its easy-to-use web interface lets you select, run, and view the reports you want to see, including:

  • System Values 
  • User Profiles  
  • Object Authorities  
  • Security Audit Journal (QAUDJRN) log data  
  • HelpSystems Network Security Log Data (FTP, ODBC) 
  • HelpSystems Authority Broker Log Data (privileged users)

Consolidated Reporting

All report types can consolidate data from multiple systems into single reports to make it easier to review reports and compare systems.

SOX and PCI Compliance

Compliance Monitor includes a recommended set of compliance reports and explains IBM i concepts for auditors and security staff. An interactive Compliance Guide maps security issues to common industry frameworks and standards like COBIT, PCI, and ISO 27002 (17799).

Gaming (MICS) Reporting

Compliance Monitor provides a set of reports designed to help you meet Minimum Internal Control Standards (MICS) gaming compliance reporting guidelines.

Customized Reporting

Compliance Monitor lets you define and display just the information you need. Flexible filters allow you to generate the reports that you and your auditors want (including SQL queries) at a lower cost than developing and writing custom code.

 

“Compliance Monitor handles all our reporting requirements, and being able to design, test, and use our own reports is great. We use it to specify our own security policy and cross check against it automatically—that's the great feature that really makes sense.” –Paul Ballew Data Processing Incorporated Sr. Vice President and IT Manager

Policy Exceptions

You can decrease report review time dramatically by showing only exceptions to policy. The default policy included with Compliance Monitor is based on HelpSystems-recommended best practices. You can easily create customized policies for your organization, or for each system.

PDF, Excel, and CSV Export

You can export Compliance Monitor reports to Adobe PDF, Microsoft Excel, or comma-separated value (CSV) formats.

Compressed Audit Journal Storage

With Compliance Monitor’s innovative log aggregation architecture, audit journal data is stored compressed (up to 95%) on a central consolidator system. You can store months of audit records without using extra disk space. For example, you can effectively monitor all 74 IBM-type T events from QAUDJRN, including common events, such as:

  • Object changes, reads, creations, deletions  
  • User profile changes  
  • Commands used  
  • User and password login failures 
  • System value changes

Batch Assessments

Schedule your assessments to run at regular times and distribute the reports to selected recipients automatically

System Groups

By arranging systems in logical groups, you can launch assessments of multiple servers with one command.

Scorecard Reports

Management can track compliance status for each system using a one-page scorecard view with numerical ratings.

 

Let’s Get Started

Find out what Powertech Compliance Monitor for IBM i can do for you. We’ll review your current setup and see how HelpSystems products can help you achieve your security and compliance goals.