Free IBM iSecurity Assessment

iSecurity Assessment

The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities and areas of concern in regard to various aspects of IBM iSecurity. The iSecurity Assessment provides a detailed report, telling you want you need to know about potential threats and vulnerabilities on your IBM i system.

The assessment installs and runs in five minutes or less, and generates a report only you can see. Once completed, you'll have a consultation with one of our IBM i/AS400 security specialists who will help you better understand the results of your assessment, provide details into industry best practices, and give you suggestions and options to secure your IBM i system.

image
image

Determines if proper controls and remote activity controls are in place

image

Identifies if there are too many high-level access users on your IBM i

image

Facilitates identifying breaches in real time

image

Identifies potential threats and vulnerabilities on your IBM i system

image

Provides recommended solutions to remediate identified security shortcomings

Features of iSecurity Assessment

image

Summary Report

The summary report runs in minutes and identifies the strengths and weaknesses of your computer’s security policies providing an executive summary of your IBM iSecurity. The iSecurity Assessment report provides a thorough summary of your security controls including colorful, graphically displayed results, numerical scores explaining the results and easy hyperlink navigation throughout the report.

Detailed Security Assessment

iSecurity Assessment performs a thorough check on the security controls within your environment. The assessment includes checking and reporting on open ports, user sign-on attributes, power users in the environment, adherence to auditing policies and how secure the network is based on assessment.

image
image

Non-Intrusive, security assessment

Accesses your IBM iSecurity information from a PC without requiring command line access. Intuitive and easy to understand through a simple download and executable windows process. The iSecurity report enables you to perform the analysis from your PC, to assess security strengths and weaknesses while pinpointing key security risks requiring remediation.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW