Software AG no longer operates as a stock corporation, but as Software GmbH (company with limited liability). Despite the change of name, we continue to offer our goods and services under the registered trademarks .
DATASHEET

Adabas Auditing for z/OS®

Maintain data security and compliance with a simple, powerful way to track and audit all activity on your Adabas databases.

Adabas Auditing for z/OS is a powerful, secure and easy-to-use web-based tool that helps your organization stay fully compliant with ever-growing regulations. Maintain full visibility into your database activity while enhancing cybersecurity efforts by detecting unauthorized access.

Track and trace who is accessing, reading and changing your data

Organizations running Adabas on IBM z/OS have generated decades’ worth of valuable information, including financial data, personal files and proprietary business material. During the course of business, this  data is regularly accessed by multiple applications, end-users and services. To maintain security and comply with ever-growing regulations, you need to know who is reading or changing your data, the changes  made, when and where the activity occurred and which applications were used to access your data. This calls for a solution that delivers efficient and comprehensive ways to track and trace both read and edit activity in your databases. Adabas Auditing for z/OS tracks and stores audit data safely in secure, indexed, long-term archives—helping you stay on top of data security and compliance regulations, including HIPAA, SOX and GDPR, to keep your Adabas systems secure and reliable for years to come.

A comprehensive auditing solution for all stakeholders

Adabas Auditing for z/OS is useful for every stakeholder responsible for data security. Gain the ability to generate more detailed, complete insight, with easy access to this historical information in secure, indexed, long-term archives. These capabilities will help keep your organization in compliance with evolving data regulations and more easily identify unauthorized activity in your databases.

Empower auditors to certify that IT systems follow quality standards and regulations

Determine if data is correctly archived, is clearly identifiable and spans a specific time period to comply with guidelines. Track which users or programs manipulated what data, and when.

Enable database administrators to track all access and activity on the database 

Know what data is being captured or exported, trace specific users and applications for each event, resolve data inconsistencies, fix production outages and provide proper access rights.

Support data protection officers with infrastructure and tools for security audits

Ensure data is available to external auditors, archived consistently and separately from production data, and stored for specific periods to comply with regulations, with access limited to authorized personnel.

Features

Audit all Adabas applications

Use Adabas Auditing for z/OS on all Adabas applications, including Natural, COBOL, Assembler, PL/1 and Fortran.

Track all Adabas database operations

Track and audit all commands for user files on the database including read, search, browsing, insert, delete and update commands for all user files on a database.

Customize audit tracks

Select your choice of data from many Adabas databases, then apply filters to focus only on relevant Adabas events.

Protect audit data

Ensure audit data is only available to authorized persons, prevent alterations to audited data and mask sensitive archived information.

Archive and retrieve audit data

Retain audit data with long-term archiving capabilities to comply with both regulations and internal standards. Index archived data to quickly retrieve and search data logs.

Easy-to-use web-based user experience

Enable fast deployment and use by multiple stakeholders including auditors, security officers and database administrators.

Key benefits

  • Deliver audit reports faster, and with less effort, to comply with evolving regulations
  • Out-of-the box vendor-supported solution eliminates the need to build or customize your Adabas z/OS audit tools
  • Identify unauthorized intrusion and activity in your database
  • Customize audit criteria and retention periods to meet specific requirements
  • Maintain high database performance
  • Intuitive user experience for auditors, security officers and database administrators
  • Leverage the security and reliability benefits of IBM zSystems
Adabas Auditing for z/OS
Every stakeholder responsible for data security will find value from using Adabas Auditing
Take the next step:
Stay connected
Join the community and follow the latest news about Adabas & Natural in the Software AG Tech Community.
See what's new
Discover the latest innovations, view webinars and see how Adabas & Natural is ready for 2050 and beyond.
International User Groups
Join one of our User Groups to network with your peers from all around the globe.
Want to make your core applications future ready?
Build on your legacy. Accelerate development in a modern DevOps environment. Modernize your Adabas & Natural applications to save costs and embrace hybrid cloud. 
ICS JPG PDF WRD XLS