Related Products
|
||||||
About
Go beyond static File Integrity Monitoring (FIM). Automate integrity in motion and at rest—in real-time. With eXtended Integrity Monitoring (XIM) from Chainkit. Chainkit detects threats faster and in real-time, which in turn reduces the amount of time that undetected attacks linger in your data. Chainkit dramatically increases the visibility of attacks within your data. It detects anti-forensic tampering techniques that attackers use to evade detection. Chainkit seeks out malware hidden within your data and provides full transparency on tampered logs. Chainkit preserves the integrity of artifacts required by forensic investigators. Chainkit enhances attestation for ISO, NIST and related log or audit trail compliance requirements. Chainkit can help you reach and maintain compliance for all security compliance regulations. We provide customers with a more comprehensive audit-readiness posture.
|
About
With real-time visibility into every change users make across all systems, security administrators can virtually eliminate the risk of undetected data corruption. See what users are changing across systems. By combining data from multiple, connected systems, you have a centralized view for reporting and archiving, making database security management easier. Maintain an audit trail of all system changes made in a secure database that helps you meet the requirements of some of the most stringent security regulations. Use filters to monitor and record changes to only your sensitive data. Define which fields contain data to be monitored and set the criteria for triggering a notification. Both powerful and easy-to-use, Powertech Database Monitor for IBM i automatically monitors user activity in real time on your IBM i databases. The ability to process events by exception helps you reduce manual database security and file integrity monitoring in order to streamline workflows.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Cybersecurity solution for organizations wanting to detect invisible data integrity attacks in real-time
|
Audience
IT teams searching for an advanced database security monitoring software for IBM i
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$50 per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationChainkit
Founded: 2017
United States
chainkit.com
|
Company InformationFortra
United States
www.fortra.com/products/database-security-monitoring-software-ibm-i
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
|
|||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Integrations
IBM i
|
||||||
|
|