Close
  • What kind of Security Data should I integrate into an enterprise solution?
  • What are key criteria to consider for implementing a solution to transmit data from the IBM i
  • Why send IBM i data to a SIEM solution?
  • An overview into iSecurity syslog capabilities for transmitting audit logs, remote activity, application change and other critical security activity

To view this webinar on demand, please fill out and submit the form below:

Integrating IBM i Security Data with an Enterprise SIEM solution using iSecurity Syslog

In this webinar we will discuss:

Given the IBM i’s role of hosting critical applications with sensitive data, many companies are requiring that IBM i security data be integrated into an enterprise SIEM solution such as Splunk, Imperva, QRadar or others to gain a clearer picture of security across multiple platforms in the organizations and comply with industry regulations.  


Organizations considering integrating IBM i security data into a SIEM have to consider many factors in determining the types of security data to transmit as well what is the best solution for transmitting data to an enterprise security solution.

IBM i Webinar Series