Antivirus Protection

Security and Compliance

Although the IBM i does not run .exe files, it can house infected files in its Integrated File System (IFS), where they can silently wait until someone on the network transfers and opens that file on their PC.

iSecurity Antivirus enables you to detect and quarantine infected IFS files, helping to keep viruses away from your network and your PC’s and servers.

image
image

Prevents your IBM i IFS from becoming an infection source

image

Scans IFS objects before and/or after they are used

image

Built in scheduler enables planned IFS virus scanning

image

E-mail and SMS text message can be sent when a virus is detected.

image

Maintains historical logs of virus activity and scanned objects for review and analysis

Features of iSecurity Antivirus Protection

image

On-Access & On-Demand scanning

iSecurity Antivirus scans all accessed files, before and/or after they are used. It detects, marks, quarantines and deletes infected files, helping to prevent your IBM i from becoming an infection source. Antivirus also offers On-Demand scanning, including a command-line scanner, virus scanning inside batch processes, and scheduled scanning through integration with the IBM i Job Scheduler.

Automatic, regularly updated virus signatures

iSecurity Antivirus uses automatic, regularly updated virus signatures using the Cisco ClamAV open-source engine. Antivirus’s signature file is frequently updated, even before many commercial files are updated.

image
image

Alerts, Reporting, and History Logs

Antivirus reports may be emailed and alerts sent for each signature database update and scheduled file scan. History Logs are available for review and analysis of antivirus and malware activity.

ICAP client scanning to reduce performance impact

Using its iCAP client, Antivirus can migrate the virus scanning process outside the IBM i to external ICAP servers. Using the iCAP client frees up IBM i resources, reducing the overall impact that iSecurity Antivirus has on system performance.

image

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW