Find the Breach in the Millions of Log Entries You’ve Collected

Tue, Jun 13, 2017 12:01 PM CDT{LOCAL_TZ}

Find the Breach in the Millions of Log Entries You’ve Collected

Content by Software Engineering of America, Inc.

Tue, Jun 13, 2017 12:01 PM CDT

Identifying the needle in the QAUDJRN haystack

During the past 5-10 years, IBM i security teams have spent a significant amount of time, 
energy and resources attempting to comply with auditor’s requests. So by now, these teams 
have nearly every audit report required or imaginable. 

Yet, whereas the data is available, transforming this data into information and using it for 
investigations to pinpoint security breaches (such as unauthorized access to business-critical data), 
remains a challenge.

In this webinar we will first discuss how security has evolved over the past year from "nice-to-have" 
to "must"; afterwards we will explore aspects of security that companies need to focus on today, 
in order to successfully address the latest security, auditing and compliance challenges:
  • Automate security beyond periodic report generation
  • Utilize advanced graphical tools to identify and isolate security issues
  • Implement security-related technologies such as all-inclusive audit trails
  • Maintain your company’s optimal security level through periodic check-ups, 
  • baseline comparisons and more

Featured Speakers:


Mel Zucker
Senior Solutions Engineer
Software Engineering of America, Inc.


Jeremy Sacher
Technical Sales Manager
Software Engineering of America, Inc.




Back to Event Center
close log in form button
Log In Now Not Registered?

close register form button
  • z/OS
  • z/VM (Linux on z Systems)
  • z/VM (Not hosting Linux on z)
  • Other z Systems OS
  • IBM i
  • AIX
  • Linux on Power
  • Agree