Skip to Main Content

Detect

Products > Modernization > Detect

IBM i Security Event Monitoring

Receive real-time notifications of critical security events impacting your IBM i. Early detection of suspicious system activity allows you to take proactive action and protect your systems.

TGDetect

Advantages of Using Detect

Detect monitors multiple sources of security event data on IBM i and allows you to control how you want to be alerted to that data. QHST, Message Queues (including QSYSOPR), QAUDJRN, and Sensitive Command Monitoring are all covered.

Alert

Real-time alerts for suspicious system activity

Get to know a problem is happening when it’s happening.

Circular arrows with gear and warning sign

Monitoring for major security-related event data

Funnels critical security events to the top.

Save time

No need to review endless records of event data integrated with the Security Suite.

Screen with lines and boxes

Flexibility

Highly flexible customization offers the ability to filter alerts based on what is important to you.


Customize Your Security Alerts with Detect

High volumes of system events make it difficult to differentiate critical security events from acceptable usage. With Detect’s highly flexible customization, you filter alerts based on what is important to you. See failed sign-on attempts for specific powerful users and real-time journal events. Implement Security Suite message alerts for events like attempted remote connections, questionable user profile changes, and production library authority issues.


Try Detect and See For Yourself

Let Detect do the work for you. See the events that are important to you right in your inbox, as they are happening.

Download a Free Trial