Welcome!

IBM Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, Stefan Bernbo

News Feed Item

Halcyon Announces Authority Swapper 10.0 With Security Forensics for IBM i Auditors

PETERBOROUGH, England, December 6, 2012 /PRNewswire/ --

Halcyon Software, the global leader in systems management software, has announced the immediate availability of Authority Swapper 10.0, the latest version of the access control tool for the IBM i.  The solution allows IT managers to grant higher levels of authority to users for temporary periods and this release adds unique functionality by providing a visible forensic trace of user activity which assists organisations to meet security compliance rules and regulations.

The major enhancement is Audit Replay, a unique screen recording capability that visually captures all user activities during their temporary access to greater security privileges. Typically, users need these higher levels of access for defined periods in order to complete specific tasks as part of their job role.  By replaying the visual record of the screens visited and the user's activity, compliance teams have a visible trace and can quickly see what has happened without having to have a technical understanding of the IBM i system.  This new feature significantly reduces the time taken to audit user activities.

Authority Swapper 10.0 also logs, records and stores every activity carried out by users during such sessions, all of which can be automatically exported to a secure, encrypted file for internal and external auditing purposes.  

"This new release of Authority Swapper simplifies the audit process for compliance teams because they would previously have needed to review all the IBM i commands a person had used as well as have an understanding of the command language to realise the implications," commented Carole Chandler, Sales and Marketing Director of Halcyon Software.  "Halcyon Software is the first to introduce this new feature which effectively provides a visual surveillance recording making the forensics much clearer to auditors without IBM i skills.   It will help a wide range of organisations, including banks, insurance companies and the gaming industry, to meet their security compliance obligations."

Authority Swapper 10.0 is available as a standalone product for all organisations using the IBM i.  Existing Halcyon customers of Authority Swapper can upgrade free of charge.   The solution can also be cost-effectively integrated into Halcyon Software's market-leading monitoring suites for IBM i systems to give real-time intrusion detection.

About Halcyon Software

Halcyon Software is a global leader in multi-platform systems management software solutions that reduce the complexity and cost of monitoring critical business systems, core applications and processes.  They support IBM enterprise-class systems, including IBM® i and AIX®, as well as Windows® and Linux® platforms.  Halcyon solutions are used world-wide by large multi-nationals, corporate and public sector data centres as well as small to medium sized organisations to ensure that vital IT systems, business applications and services are available 24/7.  With regional offices in Peterborough UK, Philadelphia USA, and Melbourne Australia, Halcyon also has an international network of partners and distributors supporting Europe, the Americas and Asia Pac.  For further information please visit http://www.halcyonsoftware.com

Contact: Carole Chandler, Halcyon Software, Tel: +44(0)1733-234995, Email: carole.chandler@halcyonsoftware.com ; Paul Jennings, PJMC Limited, Tel: +44(0)-1926-312886, Email: info@pjmc.com

http://www.halcyonsoftware.com


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...