The Intellinx architecture is highly and scalable, providing a cost effective solution to organizations ranging from 500 to 100,000+ employees.
Organizations relying legacy systems face a significant challenge of protecting applications that were developed more than a decade ago and were not designed with the necessary control mechanisms for today’s open environment and privacy regulations. These regulations (PCI, GLBA, HIPAA and others) require organizations to maintain an audit trail of user access to customer sensitive data including update transactions and queries.
Typically, there is no application access logging mechanism in legacy systems. Developing such a mechanism involves tremendous effort, since thousands of the organization’s programs need to be changed. In some cases there are mechanisms in place that track changes in the corporate databases, yet this method is insufficient, since it tracks only “update” actions performed in the database, but does not cover “read” or access actions.
Intellinx enables tracking user activity and business processes across all major platforms including legacy systems. Since user activity is reconstructed from network transmissions, Intellinx monitors any type of user activity regardless of the host’s operating system (OS/390, VSE, VM, OS/400, etc.) or TP monitor (CICS, IMS/DC, TSO, etc.). The database used by the applications is transparent as well (DB2, IMS, ADABAS, VSAM, etc.).
This wide coverage allows customers to monitor the activity of any type of end-user – business users as well as privileged users including database administrators, system administrators and application programmers.