MIDRANGE dot COM Mailing List Archive



Home » MIDRANGE-L » July 2008

Re: System i Database Monitoring



fixed

You could have a look at Bytware (www.byteware.com). We have their
StandGuard Network Security product and it's primarily a exit-point
security tool but it does a suite of canned reports and it's not expensive.
If you're not interested in using it to lock anything down it will still
log everything that goes on.



Kevin Brake, MSSE
Applications and Business Analyst - Enterprise Solutions
Information & Technology Services
City of Goodyear
190 N. Litchfield Rd.
Goodyear, AZ 85338
623-882-7857
623-882-7858 (Fax)
kevin.brake@xxxxxxxxxxxxxx




"Ketzes, Larry"
<Larry.Ketzes@AIG
.com> To
Sent by: "'Midrange Systems Technical
midrange-l-bounce Discussion'"
s@xxxxxxxxxxxx <midrange-l@xxxxxxxxxxxx>
cc

07/25/2008 09:06 Subject
AM System i Database Monitoring


Please respond to
Midrange Systems
Technical
Discussion
<midrange-l@midra
nge.com>








Hello all,
I have been tasked with finding a product (3rd party seems to
be
preferable) to monitor and report on database access by users on the
system.
They are using these products for other platforms and these packages make
it
very easy for the auditor to look at access and generate pretty reports. I
know journaling covers the actual tracking on the system I, but is there a
package out there that will do this reporting nicely for them without
having
to write something in-house?

Thanks in advance,

Larry
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.








Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2014 by MIDRANGE dot COM and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available here. If you have questions about this, please contact