Security Solutions for IBM i centrally monitor and modify compliance reports and job activities for multiple IBM i servers using a single, web-enabled interface.
The dashboard feature allows you to visualize the security status of multiple servers from a centralized, web-enabled interface.
The activity feature allows you to perform real-time monitor of incoming transactions.
The rules feature allows you to monitor and modify job activity rules consistently across multiple servers.
The groups feature allows you to organize elements (i.e., objects, network, users, etc.) and implement changes quickly and consistently across multiple servers.
The reporting feature allows you to run, monitor, and modify compliance reports for multiple servers. In addition, you can produce delta reports that identify modifications made to a previous state.
Security Solutions for IBM i efficiently controls access to your IBM i, iSeries and AS/400 servers by enabling you to lock down your servers through transaction blocking or via implementation of intelligent privilege escalation management.
The network security module monitors the server's socket layer as well as all remote servers, and it has the capability of blocking transactions at either level.
The Access Escalation Manager module enables you to grant granular escalated permission at the command, program, or database file level. Easily implement intelligent privilege models that support corporate operations without compromising security.
The resource management module allows you to manage object-level and Integrated Files System (IFS) security using authority schemas. Think of an authority schema as a template that defines authority best practices.
The ISL module allows you to customize how and when to end a user's session or lock a user's session when the system detects user inactivity for a specified duration (which is defined by an ISL rule).
The user profile management module allows you to manage user profiles using blueprints. Think of a blueprint as a template that defines user profile best practices.
Security Solutions for IBM i simplify the process of identifying IBM i and iSeries security vulnerabilities, regulation compliance policy exceptions and other exposures through its TGAudit functionality. TGAudit reports security exposures related to a variety of OS/400's aspects including user profiles, files and objects and system values. The TGAudit solution can:
Predefined report cards map IBM i security auditing data to several major compliance regulations such as PCI, HIPAA and SOX.
TGAudit supplies a vast amount of knowledge to help you easily gain a comprehensive view of your overall system security and assess the risk of potential security vulnerabilities.
TGAudit efficiently identifies and reduces vulnerabilities on your i and iSeries platforms, including configuration flaws, dangerous services and exposed user accounts from a central point.
TGAudit provides quick time to value with its user-friendly installation and configuration features. It can be up and running in a matter of minutes, allowing you to use it immediately and quickly start assessing your i and iSeries assets.
Security Solutions for IBM i actively monitors your i and iSeries servers for critical system and security events in real time leveraging its TGDetect functionality. With the ability to integrate with Sentinel as well as send alerts to ArcSight, TGDetect ensures your i and iSeries servers can be monitored along with the rest of your enterprise assets. This assures service levels, operational integrity, and policy compliance for your organization. You can quickly enforce your security policies, and assure the availability and performance of your i and iSeries systems, by prescribing a response to a detected anomaly, such as notifying the user via email, executing a program, or forwarding events to SIEM, such as ArcSight. The TGDetect solution can:
Provides comprehensive monitoring of the history log (QHST), message queues (QSYSOPR), command activities, and system journals (QAUDJRN).
Assures operational integrity and compliance with policies and allows you to monitor for security and policy violations across your i and iSeries environment. You can also notify your incident response teams via numerous mechanisms.