iSecurity Assessment

What is iSecurity Assessment?

The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities and areas of concern in regards to various aspects of IBM i Security. The iSecurity Assessment provides a detailed report, giving you the information you need to know about potential threats and vulnerabilities on your IBM i system.

The assessment installs and runs in five minutes or less, and generates a report, only you see.

Once completed, you'll have a consultation with one of our IBM i/AS400 security specialists who will help you better understand the results of your assessment, provide details into industry best practices, and give you suggestions and options to secure your IBM i/AS400 system.

Features of iSecurity Assessment

The iSecurity Assessment delivers the answers to:

  • Whether or not controls and remote activity are in place
  • Are there too many high-level access users on your AS400?
  • Are you detecting a breach in real time?
  • Can you deliver and meet the compliant requirements of government and private regulators

The results to show the details you need to see on:

  • User class
  • User privileges
  • System settings
  • Exit points
  • Sign on attributes
  • Password control
  • Unattended terminals
  • and much more
Show All Hide All
  • Non-Intrusive Security Assessment

    Accesses your IBM i security information from a PC without requiring command line access.

    Intuitive and easy to understand through a simple download and executable windows process.

     

     

    iSecurity Assessment checks the security of your IBM i/AS400 system with ease

  • Executive Summary of your IBM i Security

    Generate a detailed report on the system’s security status in numerous categories in minutes which could be emailed to appropriate reviewers.

     

     

     

    iSecurity Assessment checks the security of your IBM i/AS400 system with ease

  • Detailed Security Assessment Report

    Generate a detailed report on the system’s security status in numerous categories in minutes which could be emailed to the appropriate reviewer.

     

    iSecurity Assessment - Detailed Security Assessment Report