Exit Point Monitoring & Intrusion Prevention
What is iSecurity Firewall?
Technological advances of recent years forced IBM to open up the IBM i data to the rest of the world. This new access to IBM i data opens the door to many security risks inherent in distributed environments. System administrators and security managers need to equip themselves with a new generation of security tools to combat these evolving modern threats.
iSecurity Firewall enhances the native IBM i by controlling access via known external sources and controlling what users are permitted to do once access is granted.
Benefits of Using iSecurity Firewall
- Protects security related IBM i exit points and servers - more than any other product on the market
- Protects all communication protocols (TCP/IP, FTP, ODBC, Telnet, WSG, Pass-through, etc.)
- Precisely controls what users may perform after access is granted - unlike standard firewall products
- Protects both native and IFS objects - all of your databases are secured
- Remote logon security limits IP address to specific users
- Automatic sign-on with alternate user profiles (usually with restricted authorities) enhances security when authorized users connect from remote locations
- Powerful report generator and scheduler
- Robust log functions as a table with the ability to filter, sort, organize and present data
Features of iSecurity Firewall
iSecurity Firewall protects and secures remote access to and from the IBM i. This robust, cost-effective security solution for Power Systems including AS400, iSeries, and System i, is by far the most intuitive and easy-to-use security software product on the market today. As part of iSecurity's intrusion prevention system, iSecurity Firewall manages authorized user access which would usually not include command line access to execute powerful commands locally. By exploiting the exit point vulnerability that exists in the IBM i platform, users can perform an unauthorized activity using remote TCP/IP applications, protocols, and services designed to connect to the server remotely.
iSecurity Firewall's "top-down" functional design and intuitive logic creates a work environment that IBM i administrators, security professionals, auditors, and senior management can master quickly. iSecurity Firewall features a user-friendly, Eclipse-based GUI (Graphical User Interface) in addition to the traditional 5250 green-screen interfaces.
Complete Access Control to the IBM i
iSecurity Firewall gives users and companies the ability to control object access at the level of specific action, such as read, write, delete, rename, run, etc….With firewall you can secure both Native IBM i, IFS objects, as well as protect files, libraries, programs, commands, data queues, and print files. Firewall’s flexible architecture allows a user to create definable rule exceptions for specific users.
iSecurity Firewall gives you the power to work in simulation or instructional mode before you go live with your security plan. Generate restrictions, test alerts, and roll out your compliance plan without a single production breakdown. Flexibility to go into full intrusion prevention mode one exit point at a time (such as ODBC, SQL, FTP, etc.) after you are fully satisfied with your current rule definitions and how your remote transactions to the IBM i are being logged.
Graphical Intelligence & Analysis
Built into iSecurity Firewall, is the iSecurity Visualizer Business Intelligence System for display and analysis of data from the IBM i The iSecurity Visualizer provides graphical presentation and analysis of iSecurity Firewall's log data and instantaneous responses to queries regardless of log file size. The visualizer component is a critical tool for investigative purposes to isolate specific events on specific dates in minutes.
Powerful Report Generator and Scheduler
iSecurity Firewall provides over 100+ reports that will meet your needs for SOX, PCI, HIPAA, and many others. The powerful Report Generator allows users to quickly and easily create iSecurity Firewall reports without programming. Queries employ robust selection criteria such as AND/OR, equal/not equal, greater/less than, like/not like, included in list, etc. Report formats are fully customizable and can be put to an OUTFILE, Emailed, or stored in the IFS.