Security Solutions for IBM i centrally monitor and modify compliance reports and job activities for multiple IBM i servers using a single, web-enabled interface.
Simplify multi-server security administration
The dashboard feature allows you to visualize the security status of multiple servers from a centralized, web-enabled interface.
Improve security monitoring
The activity feature allows you to perform real-time monitor of incoming transactions.
The rules feature allows you to monitor and modify job activity rules consistently across multiple servers.
Implement change quickly
The groups feature allows you to organize elements (i.e., objects, network, users, etc.) and implement changes quickly and consistently across multiple servers.
The reporting feature allows you to run, monitor, and modify compliance reports for multiple servers. In addition, you can produce delta reports that identify modifications made to a previous state.
Security Solutions for IBM i efficiently controls access to your IBM i, iSeries and AS/400 servers by enabling you to lock down your servers through transaction blocking or via implementation of intelligent privilege escalation management
Uncover network security vulnerabilities
The network security module monitors the server’s socket layer as well as all remote servers, and it has the capability of blocking transactions at either level.
Manage privileged operations
The Access Escalation Manager module enables you to grant granular escalated permission at the command, program, or database file level. Easily implement intelligent privilege models that support corporate operations without compromising security.
Enforce object level authority
The resource management module allows you to manage object-level and Integrated Files System (IFS) security using authority schemas. Think of an authority schema as a template that defines authority best practices.
Lockdown inactive session
The ISL module allows you to customize how and when to end a user’s session or lock a user’s session when the system detects user inactivity for a specified duration (which is defined by an ISL rule).
Define and enforce user-profile best practices
The user profile management module allows you to manage user profiles using blueprints. Think of a blueprint as a template that defines user profile best practices.
Security Solutions for IBM i simplify the process of identifying IBM i and iSeries security vulnerabilities, regulation compliance policy exceptions and other exposures through its TGAudit functionality. TGAudit reports security exposures related to a variety of OS/400’s aspects including user profiles, files and objects and system values. The TGAudit solution can:
Ease regulation compliance efforts
Predefined report cards map IBM i security auditing data to several major compliance regulations such as PCI, HIPAA and SOX.
Improve visibility into your server state
TGAudit supplies a vast amount of knowledge to help you easily gain a comprehensive view of your overall system security and assess the risk of potential security vulnerabilities.
Identify and reduce vulnerabilities
TGAudit efficiently identifies and reduces vulnerabilities on your i and iSeries platforms, including configuration flaws, dangerous services and exposed user accounts from a central point.
Enable quick time to value
TGAudit provides quick time to value with its user-friendly installation and configuration features. It can be up and running in a matter of minutes, allowing you to use it immediately and quickly start assessing your i and iSeries assets.
Security Solutions for IBM i actively monitors your i and iSeries servers for critical system and security events in real time leveraging its TGDetect functionality. With the ability to integrate with Sentinel as well as send alerts to ArcSight, TGDetect ensures your i and iSeries servers can be monitored along with the rest of your enterprise assets. This assures service levels, operational integrity, and policy compliance for your organization. You can quickly enforce your security policies, and assure the availability and performance of your i and iSeries systems, by prescribing a response to a detected anomaly, such as notifying the user via email, executing a program, or forwarding events to SIEM, such as ArcSight. The TGDetect solution can:
Provide comprehensive monitoring
Provides comprehensive monitoring of the history log (QHST), message queues (QSYSOPR), command activities, and system journals (QAUDJRN).
Assure operational integrity and compliance
Assures operational integrity and compliance with policies and allows you to monitor for security and policy violations across your i and iSeries environment. You can also notify your incident response teams via numerous mechanisms.
Track your activity
Tracks all TGDetect activity taken in response to a specific alert or event, such as commands or emails.