Anti-Virus Protection

Security and Compliance

Although the IBM i does not run .exe files, it can house infected files in its Integrated File System (IFS), where they can silently wait until someone on the network transfers and opens that file on their PC.

iSecurity Anti-Virus enables you to detect and quarantine infected IFS files, helping to keep viruses away from your network and your PC’s and servers.

image
image

Prevents your IBM i IFS from becoming an infection source

image

Scans IFS objects before and/or after they are used

image

Built in scheduler enables planned IFS virus scanning

image

E-mail and SMS text message can be sent when a virus is detected.

image

Maintains historical logs of virus activity and scanned objects for review and analysis

Features of iSecurity Anti-Virus Protection

image

On-Access & On-Demand scanning

iSecurity Anti-Virus scans all accessed files, before and/or after they are used. It detects, marks, quarantines and deletes infected files, helping to prevent your IBM i from becoming an infection source. Anti-Virus also offers On-Demand scanning, including a command-line scanner, virus scanning inside batch processes, and scheduled scanning through integration with the IBM i Job Scheduler.

Automatic, regularly updated virus signatures

iSecurity Anti-Virus uses automatic, regularly updated virus signatures using the Cisco ClamAV open-source engine. Anti-Virus’s signature file is frequently updated, even before many commercial files are updated.

image
image

Alerts, Reporting, and History Logs

Anti-Virus reports may be emailed and alerts sent for each signature database update and scheduled file scan. History Logs are available for review and analysis of anti-virus and malware activity.

ICAP client scanning to reduce performance impact

Using its iCAP client, Anti-Virus can migrate the virus scanning process outside the IBM i to external ICAP servers. Using the iCAP client frees up IBM i resources, reducing the overall impact that iSecurity Anti-Virus has on system performance.

image

Latest Blogs

image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access
image
IBM i
April 10, 2024
Password Reset: How Much Do Manual IBM i Password Resets Cost?
image
IBM i
March 26, 2024
Waiting for AI-Enhanced IBM i Anti-Ransomware Protection

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW