iSecurity Firewall protects and secures remote access to and from the IBM i.
Firewall enhances the native IBM i by controlling access via known external sources and controlling precisely what users are permitted to do once access is granted.
Access rules can be generated and run in simulation mode for testing or in full intrusion prevention mode for active protection.
Its powerful query generator satisfies reporting needs for auditing, governmental and regulatory requirements.
Firewall’s Visualizer Business Intelligence enables IT managers to graphically analyze security related system activity quickly and easily.
Protects security related IBM i exit points and servers
Precisely controls actions remote users may perform after access is granted
Simulation mode tests IBM i security plan before going live
Provides 100+ ready-to-run queries for reporting on remote user activity
Built-in Business Intelligence allows managers to graphically analyze security-related system activity
Firewall logs actual remote requests not logged by OS400. Once logged, events may be allowed or denied by rules defined according to your company policy. Compliance reporting of these activities may be run on demand or scheduled, using Firewall’s powerful query generator and business intelligence tools.
iSecurity Firewall provides over 100+ reports that will meet your needs for SOX, PCI, HIPAA, and other laws, rules, and regulations. The powerful Report Generator easily creates iSecurity Firewall reports without programming. Firewall also includes a flexible report scheduler to enable report processing on demand or at off peak hours. A built-in business intelligence tool is ncluded, that enables IT managers to graphically analyze security related system activity quickly and easily.
As part of iSecurity’s intrusion prevention system, Firewall manages authorized user access. iSecurity FIREWALL provides monitoring, compliance and control for IBM i REMOTE activity occurring via TCP applications, such as FTP, ODBC, File Transfer, logging inbound and outbound user activity. iSecurity Firewall provides the ability to define rules to allow/deny access based upon management policy. When security events occur, Firewall can also react via sending alerts and executing corrective actions.
iSecurity Firewall gives you the power to work in simulation or instructional mode before you go live with your security plan. Generate restrictions, test alerts, and roll out your compliance plan without a single production breakdown. Go into full intrusion prevention mode one exit point at a time (such as ODBC, SQL, FTP, etc.) after you are fully satisfied with your current rule definitions.