Assure Security Risk Assessment
Assure Security Risk Assessment provides a useful and informative picture of your IBM i security. Reports can be given to IT risk and compliance auditors help fulfill requirements for an annual risk assessment required under regulations such as PCI DSS and HIPAA. The tool can be re-run at any time without burdening IT staff.
Assure System Access Manager
Assure System Access Manager primarily uses exit point technology to detect access attempts to your IBM i systems and data, determine whether to accept or deny them, and optionally log those decisions and trigger actions.
Assure Elevated Authority Manager
With Assure Elevated Authority Manager, when a user needs additional authority for a specific action, they ask for elevation of authority within their job. That request must specify a profile with the authority needed and the command to be run. Requests can be accepted by the administrator, or when configured to automatically grant requests, rules defined by the administrator are consulted to determine whether the request should be granted.
Assure Multi-Factor Authentication
When integrated with the signon screen, Assure Multi-Factor Authentication enables you to choose between single-step or two-step authentication. Single step authentication requires both the user’s password and a token for authentication. The user is not told which one failed if either is incorrect, delivering true multi-factor authentication. With the two-step process, a token screen is presented after the IBM i signon.
Assure Monitoring and Reporting
Comprehensively monitors system and database activity to save you time and money on achieving regulatory compliance, identifying compliance deviations and detecting unauthorized activities on IBM i systems.
Assure Db2 Data Monitor
Gives you complete control over the visibility of confidential IBM i data. It monitors and alerts you to users who have viewed sensitive records in Db2 databases, as well as how and when the data was viewed. It even blocks records from view by unauthorized users.
Protects sensitive data at-rest from unauthorized access using the only NIST-certified AES encryption for IBM i. Optimized for performance, Assure Encryption easily automates encryption and decryption of Db2 data, including database fields, backup tapes, Save files, IFS files and more, with built-in masking and access auditing. To keep encryption keys secure, Assure Encryption supports FIPS 140-2 compliant Alliance Key Manager from Townsend Security as well as other OASIS KMIP-compliant key management solutions. Assure Encryption also provides extensive tokenization capabilities to temporarily or permanently replace confidential information on your server with token values.
Assure Secure File Transfer
IBM i customers need to meet regulatory requirements to secure the transfer of data over the Internet and on internal networks. Assure Secure File Transfer provides secure FTP (SFTP) and Secure Shell (SSH) transfer support to meet these regulations. Additionally, PGP Command Line 9 encryption is available as an added option.