The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities and areas of concern in regard to various aspects of IBM iSecurity. The iSecurity Assessment provides a detailed report, telling you want you need to know about potential threats and vulnerabilities on your IBM i system.
The assessment installs and runs in five minutes or less, and generates a report only you can see. Once completed, you'll have a consultation with one of our IBM i/AS400 security specialists who will help you better understand the results of your assessment, provide details into industry best practices, and give you suggestions and options to secure your IBM i system.
Determines if proper controls and remote activity controls are in place
Identifies if there are too many high-level access users on your IBM i
Facilitates identifying breaches in real time
Identifies potential threats and vulnerabilities on your IBM i system
Provides recommended solutions to remediate identified security shortcomings
The summary report runs in minutes and identifies the strengths and weaknesses of your computer’s security policies providing an executive summary of your IBM iSecurity. The iSecurity Assessment report provides a thorough summary of your security controls including colorful, graphically displayed results, numerical scores explaining the results and easy hyperlink navigation throughout the report.
iSecurity Assessment performs a thorough check on the security controls within your environment. The assessment includes checking and reporting on open ports, user sign-on attributes, power users in the environment, adherence to auditing policies and how secure the network is based on assessment.
Accesses your IBM iSecurity information from a PC without requiring command line access. Intuitive and easy to understand through a simple download and executable windows process. The iSecurity report enables you to perform the analysis from your PC, to assess security strengths and weaknesses while pinpointing key security risks requiring remediation.