Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events.
Download this podcast to learn about:
- Current status of security logging on the IBM i
- The future of log collection and monitoring
- New logging sources in IBM i V7R3
- Elements of an effective active monitoring strategy