iSecurity includes over 15 individual products, securing companies’ IBM i servers, as well as their business-critical databases.
iSecurity Action is a powerful IBM i security enhancing solution that intercepts security breaches and other events in real-time and immediately takes appropriate informative and corrective action. Actions may include sending alert messages to key personnel and/or running command scripts or programs that take corrective steps.
iSecurity Anti-Virus offers total protection for the IBM i against viruses, Trojan horses, and malicious code. iSecurity Anti-Virus scans all accessed files, offers comprehensive virus detection by marking, quarantining and deleting infected files, and prevents your IBM i from becoming an infection source. No effective security policy is complete without Anti-Virus.
iSecurity AP-Journal protects business-critical information from insider threats as well as external security breaches. It keeps managers closely informed of important changes in their business-critical data and streamlines journaling procedures.
iSecurity Assessment checks user sign-on attributes, user privileges, passwords, terminals, ports and more. Results are provided instantly, with a score of current system security status in each of the categories provided alongside what your system’s security status would be if iSecurity was in place
iSecurity Audit is a leading security auditing application that examines IBM i QAUDJRN events in real time and triggers alerts and other responsive actions to potential threats.
Datasheet: Authority on Demand
iSecurity Authority on Demand (AOD) is a unique product for controlling user permissions while flexibly responding to emergency security needs of an organization. iSecurity Authority on Demand can provide temporary authorities to a user upon need, while fully monitoring the user’s activity when the authorities are active.
iSecurity Capture supports silent capturing, saving and playback of user (green-screen) sessions in the IBM i server. Recording user screen activity provides indisputable forensic evidence that
can help to quickly confirm and support what has happened on your system.
Datasheet: Multi System
iSecurity Multi System manages multiple systems from a single control point.
Datasheet: Compliance Evaluator
iSecurity Compliance Evaluator provides managers, auditors and systems administrators a quick, yet comprehensive overview of their IBM i’s level of compliance with PCI, SOX, HIPAA and other national, industry or enterprise-related regulations.
iSecurity Encryption solution allows you to fully protect all sensitive data. IBM i 7.3 introduced the database exit program FIELDPROC. Using this feature for encryption makes it part of the database capabilities and eliminates use of additional files.
iSecurity Firewall protects and secures all types of access, to and from the IBM i, whether within or outside the organization, and under all types of communication protocols.
Datasheet: IFS Object Security
iSecurity IFS Object Security solution enables system administrators to easily plan the desired security based on object name and type, check for inconsistencies between actual and planned object security settings, and at will, set as planned.
Datasheet: Native Object Security
iSecurity Native Object Security solution enables system administrators to easily define target security levels per object and object type, and to check for inconsistencies between actual and planned object security settings.
iSecurity Password is a general-purpose password management product that ensures user passwords cannot be easily guessed or cracked.
Datasheet: Password Reset
iSecurity Password Reset allows users to change their passwords on the basis of personal questions whose answers only they know.
iSecurity Screen is a terminal screen security product that protects unattended terminal screens, including PCs running terminal emulation software, from unauthorized use.
iSecurity Visualizer is a Business Intelligence System for display and analysis of data from the IBM i server.