CorreLog Announces New Release of Agent for z/OS with dbDefender™, Providing Real-time Database Activity Monitoring

Share Article

Latest release of agent for IBM z/OS provides enhanced DB2 monitoring, critical for PCI DSS, Sarbanes-Oxley, HIPAA, FISMA, NERC, GLBA and other compliance standards.

We believe that monitoring DB2 activity as it happens, alongside other real-time IT security system data, is critical for proactive cyber threat detection.

CorreLog, the leader in software solutions for IT security log management, event correlation and compliance, today announced version 5.2.0 of the CorreLog agent for IBM z/OS and its enhanced real-time monitoring feature dbDefender. The new 5.2.0 release addresses public and private industry mandates for security and compliance, leveraging DB2 activity for tracking mainframe user behavior that may indicate cyber threat. dbDefender facilitates real-time database activity monitoring (DAM) across predominantly distributed security information and event management (SIEM) systems, also known as SIEM consoles. Organizations utilizing the CorreLog agent for z/OS now have the capability, through dbDefender, to monitor unauthorized data access attempts and all actions by privileged users.

With so much of an organization’s value tied to information assets – Gartner Inc. has estimated as much as 70 percent – cyber threat has become the new battlefield in corporate America, and the centerpiece of new millennium global warfare. Because a great deal of this intellectual property resides on mainframe computers, a critical component to preventing cyber threat and maintaining compliance is real-time DB2 monitoring.

“In the past few weeks we have seen a multitude of attacks at the Federal Reserve, Facebook, Twitter, and even an alleged attack by China on the Wall Street Journal,” said George Faucher, CorreLog CEO. “We believe that monitoring DB2 activity as it happens, alongside other real-time IT security system data, is critical for proactive cyber threat detection. Additionally, this agent can track mainframe events like TSO logons, job ABENDS, TCP/IP connects, FTP, RACF, CA Top Secret and ACF2, and in real-time, as they are taking place.”

New release version 5.2.0 enhancements to the agent for IBM z/OS are as follows:
--dbDefender provides automated, real-time monitoring of DB2 activity to enable an organization to comply with PCI DSS and similar standards by centrally logging administrative access to DB2, invalid logical access attempts, reads and writes of critical tables – for both static and dynamic SQL.
--The agent provides the ability to suppress z/OS’s system logging of the additional monitored events, minimizing resource utilization.
--The agent’s dbDefender enables enterprises to monitor the integrity of system load, procedure or other critical libraries.
--The agent’s dbDefender for z/OS be bundled with CorreLog Enterprise Server or delivered as a separate solution.

More information on the new release of the CorreLog agent for z/OS with dbDefender can be found by visiting the CorreLog support portal at, or via email to support(at)correlog(dot)com.

About CorreLog:
CorreLog, Inc. is the leading independent software vendor (ISV) for IT security log management, event correlation and compliance. CorreLog's flagship product, the CorreLog Enterprise Server, combines log management, Syslog, Syslog-NG, SNMP, auto-learning functions, neural network modeling, proprietary semantic correlation, automated help-desk ticketing and reporting functions into a unique multi-platform security solution. CorreLog Enterprise Server operates across Windows, UNIX, Linux and mainframe platforms, shipping with an out-of-box PCI DSS compliant CorreLog agent for IBM z/OS, the world’s most popular mainframe operating system.

CorreLog delivers an essential viewpoint via dashboard console, providing verifiable and actionable information on the activity of users, devices, and applications to proactively meet organizational SLAs and regulatory requirements. Additionally, CorreLog automatically identifies and responds to any suspicious behavior, network attacks, or policy violations by indexing and correlating user activity and event logs, then archives the data in an enterprise server system location. This allows customer organizations to quickly identify then proactively respond to compliance violations, policy breaches, cyber-attacks and insider threats. For auditing and forensics, CorreLog facilitates regulatory requirements set forth by PCI DSS, HIPAA, SOX, FISMA, NERC, GLBA, NCUA, and many other standards. CorreLog markets its solutions through both direct and indirect partner channels.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Tony Perri
Follow us on
Visit website