Exit Point Monitoring for the IBM i

iSecurity Firewall

iSecurity Firewall protects and secures remote access to and from the IBM i.

Firewall enhances the native IBM i by controlling access via known external sources and controlling precisely what users are permitted to do once access is granted.

Access rules can be generated and run in simulation mode for testing or in full intrusion prevention mode for active protection.

Its powerful query generator satisfies reporting needs for auditing, governmental and regulatory requirements.

Firewall’s Visualizer Business Intelligence enables IT managers to graphically analyze security related system activity quickly and easily.

image
image

Protects security related IBM i exit points and servers

image

Precisely controls actions remote users may perform after access is granted

image

Simulation mode tests IBM i security plan before going live

image

Provides 100+ ready-to-run queries for reporting on remote user activity

image

Built-in Business Intelligence allows managers to graphically analyze security-related system activity

Features of iSecurity Firewall

image

Security and compliance

Firewall logs actual remote requests not logged by OS400. Once logged, events may be allowed or denied by rules defined according to your company policy. Compliance reporting of these activities may be run on demand or scheduled, using Firewall’s powerful query generator and business intelligence tools.

Report Generator and Business Intelligence Tool

iSecurity Firewall provides over 100+ reports that will meet your needs for SOX, PCI, HIPAA, and other laws, rules, and regulations. The powerful Report Generator easily creates iSecurity Firewall reports without programming. Firewall also includes a flexible report scheduler to enable report processing on demand or at off peak hours. A built-in business intelligence tool is included, that enables IT managers to graphically analyze security related system activity quickly and easily.

image
image

Complete Access Control for the IBM i

As part of iSecurity’s intrusion prevention system, Firewall manages authorized user access. iSecurity FIREWALL provides monitoring, compliance and control for IBM i REMOTE activity occurring via TCP applications, such as FTP, ODBC, File Transfer, logging inbound and outbound user activity. iSecurity Firewall provides the ability to define rules to allow/deny access based upon management policy. When security events occur, Firewall can also react via sending alerts and executing corrective actions.

Simulation Mode

iSecurity Firewall gives you the power to work in simulation or instructional mode before you go live with your security plan. Generate restrictions, test alerts, and roll out your compliance plan without a single production breakdown. Go into full intrusion prevention mode one exit point at a time (such as ODBC, SQL, FTP, etc.) after you are fully satisfied with your current rule definitions.

image

Latest Blogs

image
IBM i
February 21, 2024
How to Create IBM i Password Security Policies
image
IBM i
January 30, 2024
Five Steps to Eliminate Default IBM i User Passwords
image
IBM i
January 17, 2024
What is Phishing-Resistant Multi-Factor Authentication?

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW