Get out of reactive fire-fighting mode. Proactively address issues and achieve your SLA commitments with confidence. IBM® Sterling® Control Center Monitor tracks the critical events across your B2B and managed file transfer (MFT) infrastructure for improved operations, customer service and B2B governance. It applies rules to alert key audiences when there is a problem with a server, process or transfer. Actionable Dashboards are customized for various types of users.
New in Control Center 6.4 - Sterling Secure Proxy monitoring and security posture reporting.
Monitor and report on the following:
Failed login attempts suggest potential unauthorized access attempts that need to be investigated further.
Partners connecting with weak ciphers pose a significant risk to data transmission security.
Virus scan report summary indicates the presence of potentially harmful software that has been quarantined or removed.
Certificates expiry report summary highlights certificates that are nearing their expiry dates, necessitating prompt renewal to maintain secure communications.
Brute force attack report identifies multiple incidents of repeated login attempts, indicating targeted attacks that must be addressed.
Monitor file transfers and B2B processes. Align server views with operational logic. Identify schedules, processes, file names, user roles and security capabilities.
Central monitoring and configuration management provide visibility into file transfers and B2B processes across a supported network infrastructure through a simplified UI.
Ensure proactive visibility into SLA impact events with alerts, notifications, single-click problem interrogation, and easy rules creation.
Meet governance and compliance through continuous controls monitoring with near
real-time notifications. Consolidate and normalize file transfer and process data from managed servers into a single SQL database with embedded reporting.
Use a centralized interface to create and delete configuration objects, and update multiple servers across different platforms. Also provides syntax checking and full text searches to simplify management.
Maintains distinct versions of objects, which can be retained for auditing or restored, and provides an audit log that includes changes to configuration objects, showing changes and who made them.
Allows you to assign user authorities and proxies for servers, and provides protected templates for configuration objects, enabling comparison across servers and platforms to ensure compliance.