Define policy, and report against AS/400 system value, user profile, object, and audit journal data.
Audit and control access through all common network services (exit points) including FTP and ODBC.
Configure users with the ability to swap to profiles with more authority.
Send IBM i events to your Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) in real time.
Create and manage user profiles across multiple systems from a central management system.
Database monitoring solution that lets you automate, streamline, and centralize your IBM i database monitoring process.
Monitor selected commands and define customized actions to control unauthorized use.
IBM i and other servers are frequent targets of cyber attacks according to the 2014 Data Breach Investigations Report. Privileged users are also increasingly being targeted, if the Financial Times headlines and research conducted by the Ponemon Institute are to be believed.
Experts agree that one of the most overlooked areas of IBM i security is the integrated file system. Attend this important session to learn about securing the IFS, including what users may be doing with little more than a user profile and password.
Discover the PowerTech solutions to fit your security and compliance needs.
Attend an upcoming webinar or review the great information in our resource library.
Have any questions? Let our sales team help. Tell us what you need in your environment.