iSecurity Command monitors and filters commands and their parameters before they are run, enabling you to control each parameter, qualifier or element, in conjunction with the context in which it executes.
Command options include Allow, Allow with Changes, and Reject. The software consists of a comprehensive log, proactive alerting and easily integrates with SIEM.
Provides total control over system & user defined CL commands, regardless of how the command was entered
Makes defining command rules more flexible, as opposed to all-or-nothing approach to command security
Real-Time Alerting enables companies to ensure command usage policies aren’t being violated
Full reporting capabilities provide that security compliance requirements are being met
Command usage logs can be viewed online or in IBM i outfile or output queues
iSecurity Command allows admins to set up default command rules that can be used to generate specific ALLOW or DENY rules. Full command filtering conditions are available, using multiple Boolean operators for the required combinations of command parameters to restrict access (including profile name, IP address, library and more).
iSecurity Command can send Real-Time Alerts & process CL commands based on command usage activity. If a command is executed in a restricted fashion, Command can generate alerts via e-mail, MSGQ, SMS, Syslog, Twitter & SNMP. Alert messages can be event-specific, including replacement variables or standard alert messages. Logs can be viewed online or be sent to an output queue or outfile.
iSecurity Command comes with a powerful Report Generator that allows users to quickly and easily create audit reports without programming. Queries employ robust selection criteria. Report formats are fully customizable. The scheduler can be defined to automatically send weekly, monthly, yearly, etc. reports based on a predefined reporting plan.
We’re happy to answer any questions about our software and what we do.
CONTACT US NOW