Security Solutions for IBM i efficiently controls access to your IBM i, iSeries and AS/400 servers by enabling you to lock down your servers through transaction blocking or via implementation of intelligent privilege escalation management.
Uncover Network Security Vulnerabilities
The network security module monitors the server's socket layer as well as all remote servers, and it has the capability of blocking transactions at either level, giving you confidence that your complete network is secure from external and internal threats.
Manage Privileged Operations
The AEM module enables you to grant granular escalated permission at the command, program, or database file level, helping you easily implement intelligent privilege models that support corporate operations without compromising security.
Enforce Object Level Authority
The resource management module allows you to manage object-level and Integrated Files System (IFS) security using authority schemas. Think of an authority schema as a template that defines authority best practices. Once you create an authority schema, you can use it to evaluate and modify the authority levels of multiple users.
Lockdown Inactive Session
The ISL module allows you to customize how and when to end a user's session or lock a user's session when the system detects user inactivity for a specified duration (which is defined by an ISL rule). For security purposes, an inactive session has the potential to expose the system to unauthorized access and abuse.
Define and Enforce User-profile Best Practices
The user profile management module allows you to manage user profiles using blueprints. Think of a blueprint as a template that defines user profile best practices. Once you create a blueprint, you can use it to evaluate, create, or modify user profiles.
Security Solutions for IBM i centrally monitor and modify compliance reports and job activities for multiple IBM i servers using a single, web-enabled interface.
Simplify Multi-server Security Administration
The dashboard feature allows you to visualize the security status of multiple servers from a centralized, web-enabled interface.
Improve Security Monitoring
The activity feature allows you to perform real-time monitor of incoming transactions.
The rules feature allows you to monitor and modify job activity rules consistently across multiple servers.
Implement Change Quickly
The groups feature allows you to organize elements (i.e., objects, network, users, etc.) and implement changes quickly and consistently across multiple servers.
The reporting feature allows you to run, monitor, and modify compliance reports for multiple servers. In addition, you can produce delta reports that identify modifications made to a previous state.
Security Solutions for IBM i simplify the process of identifying IBM i and iSeries security vulnerabilities, regulation compliance policy exceptions and other exposures through its TGAudit functionality.
TGAudit reports security exposures related to a variety of OS/400's aspects including user profiles, files and objects and system values. The TGAudit solution can:
Ease Regulation Compliance Efforts
Predefined Report Cards map IBM i security auditing data to several major compliance regulations such as PCI, HIPAA and SOX.
Improve Visibility Into Your Server State
TGAudit supplies a vast amount of knowledge to help you easily gain a comprehensive view of your overall system security and assess the risk of potential security vulnerabilities. Recognizing the many unique facets within each organization, TGAudit also comes equipped with over 100 data source collectors which can be used to quickly customize unique reports as needed.
Identify and Reduce Vulnerabilities
TGAudit efficiently identifies and reduces vulnerabilities on your i and iSeries platforms, including configuration flaws, dangerous services and exposed user accounts from a central point. TGAudit also provides over 230 reports against your i and iSeries platforms.
Ensure Quick Time to Value
TGAudit ensures quick time to value with its user-friendly installation and configuration features. TGAudit can be up and running in a matter of minutes, allowing you to use it immediately and quickly start assessing your i and iSeries assets.
Security Solutions for IBM i actively monitors your i and iSeries servers for critical system and security events in real time leveraging its PSDetect® functionality.
With the ability to integrate with Sentinel as well as send alerts to AppManager, PSDetect ensures your i and iSeries servers can be monitored along with the rest of your enterprise assets. This assures service levels, operational integrity and policy compliance for your organization. You can quickly enforce your security policies, and assure the availability and performance of their i and iSeries systems, by prescribing a response to a detected anomaly, such as notifying the user via email or SNMP trap or executing a program. The PSDetect solution can:
Provide Comprehensive Monitoring
Provides comprehensive monitoring for any message queue on the system, including system queues such as QSYSOPR or other of our streams.
Assure Operational Integrity and Compliance
Assures operational integrity and compliance with policies and allows you to monitor for security and policy violations across your i and iSeries environment. You can also notify your incident response teams via numerous possible mechanisms.
Manage the Chain of Command
Manages escalation lists and broadcast groups for a chain of command in resolving issues that need immediate attention. PSDetect also creates groups (instead of single users) for notification.
Track Your Activity
Tracks all PSDetect activity taken in response to a specific alert or event, such as pages, commands or emails. PSDetect also lists actions that are waiting to be performed or that have failed.