ALL Out Announces TRACE V2 Auditing Software for IBM i

Enterprise Resource Planning / Financial
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Database change auditing package previously available only for JD Edwards products now supported on standard IBM i platform.

ALL Out security announced at COMMON the availability of the TRACE V2 Auditing Package for the IBM i platform. Previous versions of TRACE were available only for users of JD Edwards EnterpriseOne and JDE World.

TRACE originally was developed to meet the reporting requirements of users of the standard JDE Database Audit Manager (DBAM) program.  This feature of JDE was developed in 2004 to enable pharmaceutical customers to comply with the FDA regulation, 21 CFR Part 11, requiring controls and audit trails to be kept for software and systems involved in the processing of electronic data.

DBAM was version-specific and only collected data – it did'nt report it.  TRACE V1 was specifically focussed on reporting over the collected data.

Database Auditing

In addition, the DBAM and TRACE V1 combination addressed a wider requirement of JDE users who needed an audit solution that complemented the control solutions they had put in place as part of an overall compliance framework. More specifically, it answered the question, “What happened if the security systems were breached – intentionally, accidentally or maliciously?”

Security Systems Are Not Enough

There are numerous ways of controlling users –and lots of ways of securing a system.

JD Edwards itself has a sophisticated set of security features designed to control the activity of users.

Outside an application–there are many different security products that are designed to control the use of generic programs such as SQL and DFU, etc. At the recent COMMON conference there were a half  dozen such solutions in evidence. But few adequately addressed the issues that the audit and compliance community requires –the need to record the activity of users, who, for various reasons— including completely legitimate ones—must circumvent the standard controls.

Typically, IT technical staff may need to make adjustments when a transaction has been corrupted. Or a user in a small branch may need to have access to a whole range of extremely sensitive programs that are normally separated in a head office environment – segregation of duty breaches.

But there is also the issue of fraud.  And of course, users make mistakes.

And so, to meet these challenges, companies need an “after-the-event” activity auditing and database auditing tool.

TRACE V2 Is a Product for Auditors

TRACE  is a packaged software that is specifically designed for the System i platform. It addresses all the major requirements of an audit solution:

  • Auditor independence of IT – the data that is collected can be analyzed and reported on with no technical involvement.
  • Compliance reporting–it produces physical pieces of paper for sign-off, so that management can be made responsible for the activities of their staffs.
  • Data filtering–to address the issue that IT always raisees – “the volume problem – not enough disk.”  And it includes automatic purging.

Trace therefore meets the requirements of the audit community.

Benefits for IT

The big pay-off for IT is the control provided by the advanced filtering options that limits the size of the data that is archived.  The product does not use journaling to store the data. 

In fact, the data is stored in a single, secure, archive to simplify system administration and reduce the disk space used.

Availability

TRACE V2 is available now on all versions on IBM i.  Licensing is based on the System i program group and is available on a low-cost annual subscription– there is no up-front license fee. To view a video on the issues addressed by ALL Out Security software, click HERE. For more information, visit www.alloutsecurity.com or contact Richard Belton at This email address is being protected from spambots. You need JavaScript enabled to view it..

ALL Out security announced at COMMON the availability of the TRACE V2 Auditing Package for the IBM i platform. Previous versions of TRACE were available only for users of JD Edwards EnterpriseOne and JDE World.

TRACE originally was developed to meet the reporting requirements of users of the standard JDE Database Audit Manager (DBAM) program.  This feature of JDE was developed in 2004 to enable pharmaceutical customers to comply with the FDA regulation, 21 CFR Part 11, requiring controls and audit trails to be kept for software and systems involved in the processing of electronic data.

DBAM was version-specific and only collected data – it did'nt report it.  TRACE V1 was specifically focussed on reporting over the collected data.

Database Auditing

In addition, the DBAM and TRACE V1 combination addressed a wider requirement of JDE users who needed an audit solution that complemented the control solutions they had put in place as part of an overall compliance framework. More specifically, it answered the question, “What happened if the security systems were breached – intentionally, accidentally or maliciously?”

Security Systems Are Not Enough

There are numerous ways of controlling users –and lots of ways of securing a system.

JD Edwards itself has a sophisticated set of security features designed to control the activity of users.

Outside an application–there are many different security products that are designed to control the use of generic programs such as SQL and DFU, etc. At the recent COMMON conference there were a half  dozen such solutions in evidence. But few adequately addressed the issues that the audit and compliance community requires –the need to record the activity of users, who, for various reasons— including completely legitimate ones—must circumvent the standard controls.

Typically, IT technical staff may need to make adjustments when a transaction has been corrupted. Or a user in a small branch may need to have access to a whole range of extremely sensitive programs that are normally separated in a head office environment – segregation of duty breaches.

But there is also the issue of fraud.  And of course, users make mistakes.

And so, to meet these challenges, companies need an “after-the-event” activity auditing and database auditing tool.

TRACE V2 Is a Product for Auditors

TRACE  is a packaged software that is specifically designed for the System i platform. It addresses all the major requirements of an audit solution:

  • Auditor independence of IT – the data that is collected can be analyzed and reported on with no technical involvement.
  • Compliance reporting–it produces physical pieces of paper for sign-off, so that management can be made responsible for the activities of their staffs.
  • Data filtering–to address the issue that IT always raisees – “the volume problem – not enough disk.”  And it includes automatic purging.

Trace therefore meets the requirements of the audit community.

Benefits for IT

The big pay-off for IT is the control provided by the advanced filtering options that limits the size of the data that is archived.  The product does not use journaling to store the data. 

In fact, the data is stored in a single, secure, archive to simplify system administration and reduce the disk space used.

Availability

TRACE V2 is available now on all versions on IBM i.  Licensing is based on the System i program group and is available on a low-cost annual subscription– there is no up-front license fee. To view a video on the issues addressed by ALL Out Security software, click HERE. For more information, visit www.alloutsecurity.com or contact Richard Belton at This email address is being protected from spambots. You need JavaScript enabled to view it..

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$