IBM i Command Level Security

What is iSecurity Command?

iSecurity Command monitors and filters commands and their parameters before they are run, enabling you to control each parameter, qualifier or element, in conjunction with the context in which it executes.

Command options include Allow, Allow with Changes, and Reject. The software consists of a comprehensive log, proactive alerting and easily integrates with SIEM.

image
image

Provides total control over system & user defined CL commands, regardless of how the command was entered

image

Makes defining command rules more flexible, as opposed to all-or-nothing approach to command security

image

Real-Time Alerting enables companies to ensure command usage policies aren’t being violated

image

Full reporting capabilities provide that security compliance requirements are being met

image

Command usage logs can be viewed online or in IBM i outfile or output queues

Features of iSecurity Command

image

Easy to define command rules

iSecurity Command allows admins to set up default command rules that can be used to generate specific ALLOW or DENY rules. Full command filtering conditions are available, using multiple Boolean operators for the required combinations of command parameters to restrict access (including profile name, IP address, library and more).

Real-Time Alerting & Logging

iSecurity Command can send Real-Time Alerts & process CL commands based on command usage activity. If a command is executed in a restricted fashion, Command can generate alerts via e-mail, MSGQ, SMS, Syslog, Twitter & SNMP. Alert messages can be event-specific, including replacement variables or standard alert messages. Logs can be viewed online or be sent to an output queue or outfile.

image
image

Full Report Capabilities

iSecurity Command comes with a powerful Report Generator that allows users to quickly and easily create audit reports without programming. Queries employ robust selection criteria. Report formats are fully customizable. The scheduler can be defined to automatically send weekly, monthly, yearly, etc. reports based on a predefined reporting plan.

Latest Blogs

image
IBM i
February 21, 2024
How to Create IBM i Password Security Policies
image
IBM i
January 30, 2024
Five Steps to Eliminate Default IBM i User Passwords
image
IBM i
January 17, 2024
What is Phishing-Resistant Multi-Factor Authentication?

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW