Search
Close this search box.

iSecurity Authority Inspector

Excessive amount of Users with High Authority, which leads to a major risk, because usually these Authorities aren’t disallowed over time. The iSecurity Authority Inspector supports the user regardless of the specific method in use.

It enables comparison of utilized authority versus the required ones, and supports selection of the method.

iSecurity Authority Inspector also provides information on the minimal authority to be given at each stage and the frequency of testing authorities. Helping managers and system administrators, to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge.

Key Features

SAuthority Collection commands, introduced in OS400 Ver. 7.3 – Start Authority Collection (STRAUTCOL), End Authority Collection (ENDAUTCOL) or Delete Authority Collection (DLTAUTCOL) are used to collect authority data during program run.

Now that authority data is available, iSecurity Authority Inspector may be used to turn it into valuable information assisting the users in the mission of minimizing threats posed by excessive authorities.

iSecurity Authority inspector works with IBM’s Authority Collection data. It reads, summarizes and analyzes the data and presents it, with the analysis results, in graphs and tables. In some cases, the Authority Inspector presents the data in a more meaningful way to ease understanding

The iSecurity Authority Inspector is installed on a PC that processes data from the IBM i, Identifying every security breach related to excessive authorities.

  • Runs on a PC that processes data from the IBM i
  • Automatically summarizes and analyzes the data
  • Advanced Filtering options to get accurate reports
  • Graphical User Interface

Based on Clients Experience

iSecurity Authority Inspector

Business Vertical: Finance & Banking.

Need: Create Test environments for Development Teams.

“This tool helped us to be able to work with the minimum authority possible, so we could do the best job within the best practices in security for our IBM i Servers. This is extremely important as part of developing new programs to determine exact authority levels the final user will need and not compromise security inside the organization.”

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the following Form, our Sales Representatives will contact you as soon as possible.