Home » Security » Assessment

iSecurity Assessment

Analysis of IBM i Security

Assesment monitoring and logging object changes

iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of iBM i security, with full explanations.

iSecurity Assessment Key Features

  • Easy-to-use: simply download, execute and obtain results in minutes
  • Intuitive and easy-to-understand
  • Industry best-practice security system value recommendations
  • Raz-Lee certified for accuracy
  • Suggests iSecurity products required for maximum security and compliance
  • Thorough and comprehensive – checks ALL aspects of your system security

Raz-Lee Security’s non-intrusive Assessment product:

  • accesses your System i LPARs from a PC
  • reports on the system’s security status in numerous categories within minutes
  • provides industry best-practice recommendations for improving your system’s security

Assessment checks user sign-on attributes, user privileges, passwords, terminals, ports and more.

Results are provided instantly, with a score of current system security status in each of the categories provided, alongside what your system’s security status would be… if iSecurity was in place.

Besides producing a concise Executive Summary for managers, the various reports include colorful charts, a detailed written analysis, numerical scores, and clear, easy-to-follow security recommendations.

Assessment is part of iSecurity’s Compliance solution for PCI, SOX, HIPAA, site-defined, etc. regulatory issues.

 

Do you know how effective your System i security is? Unfortunately many companies don’t and hope that the security “hot potato” will not become an issue. As such, and because they believe that IBM i is a secure operating system, these companies downplay the need for a comprehensive security solution for the System i.

In reality, every system MUST be checked regularly for compliance levels, in order to ensure the highest levels of security and auditing possible.

Assessment checks your systems’ security-related definitions and values and reports – in minutes – the exact strengths and weaknesses of your computer’s security policies.

The Assessment Report shows:

  • If the network is really protected
  • If ports are wide open to intruders
  • If user sign-on attributes are implemented properly
  • If there are too many power users accessing the network
  • If auditing policies are performing as necessary
  • How secure the network would be by using iSecurity
  • If security policies adhere to IBM’s recommended values
  • What is the common denominator for object authorities?
  • If the network is detecting security breaches in real-time
  • If there is a minimum number of power users defined

If the system is PCI, SOX, etc. compliant

Assessment is certified by Raz-Lee Security and outside experts for validity, precision, and accurate results.

  • Performs a thorough check on the efficiency of your System i
  • Hyperlinks help navigate through different sections
  • Provides colorful, graphically-displayed results
  • Provides a detailed written analysis of security policy efficiency
  • Numerical scores help explain results
  • Covers user class, user privileges, system settings, exit points, sign-on attributes, password control, network protection, unattended terminals, and more.
  • Easy-to-use: simply download, execute and obtain results in minutes
  • Intuitive and easy-to-understand
  • Industry best-practice security system value recommendations
  • Raz-Lee certified for accuracy
  • Suggests iSecurity products required for maximum security and compliance
  • Thorough and comprehensive – checks ALL aspects of your system security

Related IBM i Security Products

Firewall ransomware on ibm i

Firewall

Read more

Anti Virus ransomware

Anti-Virus

Read more

Visualizer ibm i audit

Visualizer

Read more

Related Resources