Security Suite for IBM System i
A comprehensive solution that addresses all aspects of IBM i security and helps ensure compliance with cybersecurity standards. If your company needs to implement a complete set of security capabilities or if you need to address a specific vulnerability, Assure Security is the solution. It tackles issues in every security department and on the IBM i administrator's radar screen.
Whether your company needs to implement a comprehensive set of security capabilities or address a specific vulnerability, Assure Security is the solution.
It tackles issues in every security department and on the IBM i administrator's radar screen.
Assure Security includes:
- The best IBM i security capabilities acquired from Cilasoft, Enforcive and Townsend Security.
- A common package for new installations and upgrades.
- A common monitoring console with Syncsort's HA products.
- Support for user interface localization in English, French and Spanish.
Assure System Access Manager
Comprehensive Access Control to both internal and external.
- Network access (FTP, ODBC, JDBC, OLE DB, DDM, DRDA, NetServer, etc.).
- Communication port access (using ports, IP addresses, sockets - covers SSH, SFTP, SMTP, etc.).
- Database access (open-source protocols - JSON, Node.js, Python, Ruby, etc.).
- Command-level access.
Powerful, flexible and easy to administer.
- User-friendly graphical interface.
- Standard configuration provided for immediate deployment.
- Powerful and flexible rules to control access based on conditions such as date/time, user profile settings, IP addresses, etc.
- Simulation mode to test rules without impacting users.
- Supports regulatory requirements for SOX, GDPR, PCI-DSS, HIPAA, and others.
- Logs access data for SIEM integration.
Ensures IBM i systems and enables regulatory compliance.
- User-friendly graphical interface.
- Supports regulatory requirements for SOX, GDPR, PCI-DSS, HIPAA and others.
- Satisfies security officers by securing access to IBM i systems and data.
- Significantly reduces time and cost to achieve regulatory compliance.
- Enables implementation of best security practices.
- Quickly detects security incidents for efficient remediation.
- Has low impact on system performance.
Assure Elevated Authority Manager
Complete and automated control of elevated user authorizations.
- Administrators can manually grant user requests or rules can be configured to manage them automatically.
- Rules can be defined for source and target profiles based on group profiles, supplemental groups, user lists, and more.
- *SWAP or *ADOPT methods are supported for authority elevation.
- *SWAP or *ADOPT methods are supported for authority elevation.
- Handles connection processes through ODBC, JDBC, DRDA, and FTP.
Comprehensive monitoring of elevated profiles.
- Monitors elevated users and duration of elevation from GUI or 5250 screens.
- Maintains an audit trail of elevated activity using job logs, screen captures, exit points, and journals.
- An option is available to simply log user activity without changing authorities.
- Produces alerts for events such as exceeding authorized time.
- Generates reports in various formats.
- Allows integration with ticketing systems.
Enables regulatory compliance and best security practices.
- Generates an audit trail of actions by elevated profiles for compliance auditors.
- Facilitates management of on-demand elevated authority requests.
- Enforces segregation of duties.
- Significantly reduces security exposures caused by human errors.
- Reduces the risk of unauthorized access to confidential data.
Assure Multi-Factor Authentication
for IBM i
- Allows you to require two or more factors for authentication.
- Something the user knows.
- Something the user has.
- Something the user is.
- Relies on authentication service codes delivered via mobile devices, email, hardware tokens, etc.
- Allows for self-service profile reactivation and self-service password changes.
- Supports the four-eyes principle for supervised changes.
- Certified by RSA (Refer to DOC-92160 on the RSA Community site).
Powerful and flexible deployment options.
- Allows multifactor authentication to be enabled only for specific users or situations.
- The rules engine facilitates configuration when using multifactor authentication.
- Supports multiple authenticators.
- Free Syncsort authenticator.
- RADIUS-based servers.
- RSA SecureID (on-premises or cloud-based).
- Options to initiate from the 5250 login screen or on-demand (manually or from a program).
- Options for multifactor or two-step authentication.
Strengthens login security and enables compliance.
- Adds a layer of authentication beyond passwords memorized or written.
- Reduces the potential of the cost and the consequences of data theft and unauthorized access to systems and applications.
- Reduces the risk of an unauthorized user to guess or find out the password of another user.
- Addresses the regulatory requirements and the recommendations in PCI DSS 3.2, the Regulation of cyber-security NYDFS, Swift Alliance Access, GLBA / FFIEC, and more.