Find Products & Resources

Showing 8 of 8 results
  • Define policy, and report against AS/400 system value, user profile, object, and audit journal data.

  • Audit and control access through all common network services (exit points) including FTP and ODBC.  

  • Configure users with the ability to swap to profiles with more authority.  

  • Send IBM i events to your Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) in real time.  

  • The PowerTech Security Scan is the place to start when you want to secure your IBM i.

  • Create and manage user profiles across multiple systems from a central management system.  

  • Database monitoring solution that lets you automate, streamline, and centralize your IBM i database monitoring process.  

  • Monitor selected commands and define customized actions to control unauthorized use.  

Why Trust Cybersecurity to PowerTech?

With the threat landscape changing constantly, staying on top of data protection is more important than ever—and more difficult. How do you stay compliant with SOX, PCI DSS, and HIPAA when manpower is limited? What’s the most efficient way to meet auditor demands? Can you safeguard your system, while still giving users the access they need?

Automated security and compliance solutionsFounded by security experts, PowerTech is the leading source of automated security and compliance solutions for IBM i. Our products help you manage evolving data privacy threats while saving your valuable IT resources.

Compliance requirements for government regulations and industry standards grow more complicated every year, and sometimes the biggest challenge is proving you’re compliant. But meeting SOX or PCI requirements is no guarantee your system is secure. Because threats to your data evolve faster than any security standard, compliance is only the beginning.

Our modular solutions are designed to help you simplify IBM i security, so you can easily meet auditor demands and harden your system to protect your organization’s most valuable asset: your business-critical data.

PowerTech combines world-class software and outstanding customer support with IBM i security expertise that’s second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.

No matter what your current state of IBM i security is, we can help you leverage the powerful capabilities built into the IBM i platform and spend less time on manual security tasks. We can even help you find the perfect place to start.



"We started using the PowerTech products to analyze system data and user profile information to completely understand profiles, special authorities, and service accounts. Now, we’re able to navigate the auditing process faster, which allows us to be prepared every minute.”

—Renita DiStefano, Vice President of Information Technology, Seneca Gaming Corporation




“We started looking at all the different products, and we looked at two others besides the PowerTech software suite very seriously. We factored in functionality, price, length of time the product had been around, and even where the product was going. We didn’t want to buy a product and find out it’s not being actively developed anymore. PowerTech seemed to be the most proactive on the new requirements and compliance laws.”

Gavin Inman, Database Administrator, Stryker Corporation




“PowerTech Network Security is intuitive exit point control software that allows us to really lock down our network and improve our iSeries compliance.”

Emily Shellabarger, Vice President, First Security Bank