Define policy, and report against AS/400 system value, user profile, object, and audit journal data.
Audit and control access through all common network services (exit points) including FTP and ODBC.
Configure users with the ability to swap to profiles with more authority.
Send IBM i events to your Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) in real time.
Create and manage user profiles across multiple systems from a central management system.
Database monitoring solution that lets you automate, streamline, and centralize your IBM i database monitoring process.
Monitor selected commands and define customized actions to control unauthorized use.
Join noted IBM i security subject matter expert and award-winning speaker, Robin Tatam, as he leads a discussion for managers, technicians, and auditors wishing to better understand IBM i security.
Discover the PowerTech solutions to fit your security and compliance needs.
Attend an upcoming webinar or review the great information in our resource library.
Have any questions? Let our sales team help. Tell us what you need in your environment.