• Data Sheet

Assure Elevated Authority Manager

Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.

Assure Elevated Authority Manager, a feature of Assure Security, and part of its Assure Access Control feature bundle, enables you to reduce the number of powerful IBM i user profiles in your environment by allowing you to easily elevate the authority of user profiles on an as-needed basis. Elevated authority can be granted by an administrator upon request or automatically based on preconfigured rules, and it can be limited to a specific command, day, time, IP address or other parameters. 

Assure Elevated Authority Manager also enables comprehensive monitoring and reporting on elevated profiles. A graphical dashboard shows the users who are elevated, how long they’ve been elevated and more. The activities of elevated profiles are also exhaustively logged using multiple sources to create a full audit trail.

To learn more, download your copy of the full data sheet.

Share this resource:
LinkedIn
Facebook
X
WhatsApp
Email

Related posts

Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
As stories of data breaches caused by exploited credentials continue to make headlines, it is clear that basic password protection mechanisms are no longer good enough. Organisations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.