Monitored Systems

The Intellinx architecture is highly and scalable, providing a cost effective solution to organizations ranging from 500 to 100,000+ employees.

Intellinx tracks user activity in any application that utilizes any of the following protocols:

  • IBM Mainframe screen protocol – 3270 on SNA, TCP/IP (TN3270) and Enterprise Extender
  • IBM iSeries screen protocol – 5250 on SNA, TCP/IP (TN5250), and MPTN
  • Client/Server messages – TCP/IP, MQ Series, MSMQ, IBM mainframe SNA LU0 and LU6.2, SMB
  • HTTP, HTTPS
  • VT100 and other VT flavors
  • SSH
  • Oracle Forms
  • SWIFT, FIX, ISO8583 and other application protocols
  • Text and binary files, log files, database tables, XML and CSV files

Legacy Systems Monitoring

Organizations relying legacy systems face a significant challenge of protecting applications that were developed more than a decade ago and were not designed with the necessary control mechanisms for today’s open environment and privacy regulations. These regulations (PCI, GLBA, HIPAA and others) require organizations to maintain an audit trail of user access to customer sensitive data including update transactions and queries.

Typically, there is no application access logging mechanism in legacy systems. Developing such a mechanism involves tremendous effort, since thousands of the organization’s programs need to be changed. In some cases there are mechanisms in place that track changes in the corporate databases, yet this method is insufficient, since it tracks only “update” actions performed in the database, but does not cover “read” or access actions.

Intellinx enables tracking user activity and business processes across all major platforms including legacy systems. Since user activity is reconstructed from network transmissions, Intellinx monitors any type of user activity regardless of the host’s operating system (OS/390, VSE, VM, OS/400, etc.) or TP monitor (CICS, IMS/DC, TSO, etc.). The database used by the applications is transparent as well (DB2, IMS, ADABAS, VSAM, etc.).

This wide coverage allows customers to monitor the activity of any type of end-user – business users as well as privileged users including database administrators, system administrators and application programmers.