Find Products and Resources

Showing 7 of 7 results
  • Define policy, and report against AS/400 system value, user profile, object, and audit journal data.

  • Audit and control access through all common network services (exit points) including FTP and ODBC.  

  • Configure users with the ability to swap to profiles with more authority.  

  • Send IBM i events to your Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) in real time.  

  • Create and manage user profiles across multiple systems from a central management system.  

  • Database monitoring solution that lets you automate, streamline, and centralize your IBM i database monitoring process.  

  • Monitor selected commands and define customized actions to control unauthorized use.  

Founded by security experts, PowerTech is the leading source of automated security and compliance solutions for Power Systems servers running IBM i. Our products are coupled with world-class support, helping you manage the risk of costly data breaches and meet the requirements of PCI, SOX, HIPPA, and other security regulations.

Training Events

  • Oct
    16

    PowerTech’s annual "State of IBM i Security Study" shows that the vast majority of organizations allow users to access interfaces that make it easy to change or delete data. If you need to comply with any type of regulation, or if you simply want to ensure the integrity of your application data, learning about the openness of these interfaces is critical.

    • Webinar
  • In this presentation, PCI DSS implementation expert Mel Beckman describes the steps you must take to meet new PCI requirements, combining IBM i native security capabilities with external tools to bring your payment card environment into 3.0 compliance.

    • Webinar