Find Products and Resources

Showing 7 of 7 results
  • Define policy, and report against AS/400 system value, user profile, object, and audit journal data.

  • Audit and control access through all common network services (exit points) including FTP and ODBC.  

  • Configure users with the ability to swap to profiles with more authority.  

  • Send IBM i events to your Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) in real time.  

  • Create and manage user profiles across multiple systems from a central management system.  

  • Database monitoring solution that lets you automate, streamline, and centralize your IBM i database monitoring process.  

  • Monitor selected commands and define customized actions to control unauthorized use.  

Founded by security experts, PowerTech is the leading source of automated security and compliance solutions for Power Systems servers running IBM i. Our products are coupled with world-class support, helping you manage the risk of costly data breaches and meet the requirements of PCI, SOX, HIPPA, and other security regulations.

Training Events

  • Dec
    10:00am - 11:00am CST

    IBM i security is reinforced each time IBM enhances the already impressive set of built-in security features. Unfortunately, many organizations are surprised to learn that IBM i ships in a completely open default state.

    • Webinar