iSecurity Compliance Evaluator for IBM i

Single-View Overall Compliance Reports

Compliance siem support as400

Managers, auditors and administrators need a quick yet comprehensive view, analyzing the compliance of their systems with PCI, SOX, HIPAA and other regulations.

With iSecurity Compliance Evaluator, managers can easily produce any number of compliance checklists, choose the contents and structure of the result, and attach different weights to each item. 

Compliance Evaluation at a Glance

iSecurity Compliance Evaluator can be scheduled to run automatically, and its results can be emailed directly from IBM i to the relevant person.

Imagine that each morning, when you reach the office, a customized compliance information sheet awaits you.

With all this information available, you can easily ask your IT Manager to explain particular issues (rather than periodically having the IT manager manually check compliance status).

The iSecurity Compliance Evaluator enables managers to quickly check the compliance of their systems with industry and corporate policies based on customizable user-friendly reports.

Reports may be presented in Excel Format or GUI Format, and sent by Email automatically on Schedule

How Does it Work?

iSecurity Compliance Evaluator Advantages

Compliance Evaluator reports provide an overall compliance score, as well as specific ratings for topics comprising the compliance standard being evaluated.

Individual topic scores are based upon the relative importance of the items comprising the topic and, of course, the item values. Status checks are provided for items such as System Values, Network Attributes, User Profile Attributes and Object Authorities.

iSecurity Compliance Evaluator Makes It Simple

Compliance Evaluator reports are based upon both static system data and time-sensitive data covering actual network transactions. Together, these can highlight unexpected changes in user activity, such as how often users access production or system files.

The reports include operational information from QAUDJRN and from actual network activity. Virtually any type of information can be included.

Key Features

  • Network-wide compliance status at a glance
  • Built-in compliance checks for PCI, SOX, HIPAA etc.
  • Easily defined site-specific compliance checks
  • Color-coded Excel can be emailed directly from IBM i
  • Scheduling of periodic compliance checks
  • Single score per system and specific scores per topic
  • Each item & topic allocated individual importance
  • All scores displayed as percentages
  • Several report templates, with different levels of detail
  • Unlimited number of reports
  • Detailed and/or summary data
  • User-friendly GUI

Related Products


Intuitive Graphical BI analysis of security data, supports “drill” to specific events.

SIEM & DAM Support

Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.

Authority Inspector

Works with IBM’s Authority Collection data. It reads, summarizes and analyzes.


Analyzes and scores IBM i security definitions, suggests corrections and solutions.