IBM i Native Object Security

What is iSecurity Native Object Security?

iSecurity Native Object Security’s capabilities enable system administrators to easily define target security levels per IBM i object and object type, and check for inconsistencies between actual and planned object settings.

Native Object Security also enables using generic object names and includes full reporting features.

image
image

Easily defines target security levels by object and object type

image

Checks and detects inconsistencies between planned & actual security settings

image

Provides proof that your data is secure according to planned security settings

image

Reduces the number of security rules an IBM i admin is required to maintain

image

Enables multiple object security rules templates for application to different objects

Features of iSecurity Native Object Security

image

Monitor planned security status versus current security status

iSecurity Native Object Security allows users to check target (planned) settings with the current object security status, and show inconsistencies as well as setting the current security status to the planned status.

Setup Multiple Object Rules

iSecurity Native Object Security allows users to set up multiple object rules templates simultaneously, using generic naming capabilities. You can apply template settings to actual objects, in case there are changes to actual security settings. For example, you can apply template setting when a programmer is installing a new product, when a vendor is supplying an updated version of an existing product, or when reloading a system or objects from backup.

image
image

Full Report Capabilities

Full reporting capabilities are available, including OUTFILE

Latest Blogs

image
IBM i
September 14, 2023
New iSecurity Anti-Virus & Anti-Ransomware Releases Support Asynchronous Processing & Multithreading
image
IBM i
September 14, 2023
5 Ways to Protect the IFS from Cyberattacks (Part 2 of 2)
image
IBM i
July 28, 2023
5 Ways to Protect the IFS from Cyberattacks (Part 1 of 2)

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW