Data Sheets

Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.
As stories of data breaches caused by exploited credentials continue to make headlines, it is clear that basic password protection mechanisms are no longer good enough. Organisations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.
In response to today’s world of complex regulatory requirements and evolving security threats, you need a simple way to monitor all IBM i system and database activity, quickly identify deviations from compliance or security best practices, and maintain an audit trail to satisfy security officers and auditors.
Regulations like PCI DSS and HIPAA have long suggested the benefits of tracking access to confidential data. More recently, regulations like GDPR have begun to require it, and new regulations are likely to follow that lead.
Customers, business partners and employees trust you to protect their confidential information from unauthorised access and theft. Any breach of that data would negatively impact relationships and your business’ reputation.
IBM i customers need to meet regulatory requirements to secure the transfer of data over the Internet and on internal networks. Assure Secure File Transfer provides secure FTP (SFTP) and Secure Shell (SSH) transfer support to meet these regulations.
Load more