PSSecure

Security Solutions for IBM i efficiently controls access to your i, iSeries and AS/400 servers by enabling you to use its PSSecure® functionality to lock down your servers. Specifically, the PSSecure solution can:

Proactively secure network access

Proactively secures network access to your i, iSeries and AS/400 platforms. PSSecure locks down exit points by enforcing rules over who, when and how access to an object is allowed.

Securely manage user activity

Securely manages user activity through enhanced object-level security, governing what a user can do while on the system and enhanced privileged delegation for job-specific and time-specific activities.

Simplify user administration and profile management

Simplifies user administration and profile management by allowing you to synchronize user profiles and passwords across multiple i and iSeries systems, reducing the number of passwords users have to remember in multiple i and iSeries environments.

PSSecure helps find weak passwords

Identify weak passwords

Secures systems without adding risk

Secures systems without adding risk using "what if" analysis of security rules over exit point security. PSSecure allows you to analyze the impact of rules on production systems before turning them on.

TGAudit


Security Solutions for IBM i simplify the process of identifying IBM i and iSeries security vulnerabilities, regulation compliance policy exceptions and other exposures through its TGAudit functionality.

TGAudit reports security exposures related to a variety of OS/400's aspects including user profiles, files and objects and system values. The TGAudit solution can:

Ease regulation compliance efforts

Predefined Report Cards map IBM i security auditing data to several major compliance regulations such as PCI, HIPAA and SOX.

PSAudit provides data auditing and baseline analysis

Sample report card

Improve visibility into your server state

TGAudit supplies a vast amount of knowledge to help you easily gain a comprehensive view of your overall system security and assess the risk of potential security vulnerabilities. Recognizing the many unique facets within each organization, TGAudit also comes equipped with over 100 data source collectors which can be used to quickly customize unique reports as needed.

Identify and reduce vulnerabilities

TGAudit efficiently identifies and reduces vulnerabilities on your i and iSeries platforms, including configuration flaws, dangerous services and exposed user accounts from a central point. TGAudit also provides over 230 reports against your i and iSeries platforms.

Ensure quick time to value

TGAudit ensures quick time to value with its user-friendly installation and configuration features. TGAudit can be up and running in a matter of minutes, allowing you to use it immediately and quickly start assessing your i and iSeries assets.

PSDetect


Security Solutions for IBM i actively monitors your i and iSeries servers for critical system and security events in real time leveraging its PSDetect® functionality.

With the ability to integrate with Sentinel as well as send alerts to AppManager, PSDetect ensures your i and iSeries servers can be monitored along with the rest of your enterprise assets. This assures service levels, operational integrity and policy compliance for your organization. You can quickly enforce your security policies, and assure the availability and performance of their i and iSeries systems, by prescribing a response to a detected anomaly, such as notifying the user via email or SNMP trap or executing a program. The PSDetect solution can:

Provide comprehensive monitoring

Provides comprehensive monitoring for any message queue on the system, including system queues such as QSYSOPR or other of our streams.

PSDetect alerts on suspicious user activities

Alert on system value changes

Assure operational integrity and compliance

Assures operational integrity and compliance with policies and allows you to monitor for security and policy violations across your i and iSeries environment. You can also notify your incident response teams via numerous possible mechanisms.

Manage the chain of command

Manages escalation lists and broadcast groups for a chain of command in resolving issues that need immediate attention. PSDetect also creates groups (instead of single users) for notification.

Track your activity

Tracks all PSDetect activity taken in response to a specific alert or event, such as pages, commands or emails. PSDetect also lists actions that are waiting to be performed or that have failed.