iSecurity Assessment - AS400 Software | Security ... · The iSecurity Assessment offers an in depth...

3
iSecurity Assessment www.seasoft.com/isecurityassessment 1.800.272.7322

Transcript of iSecurity Assessment - AS400 Software | Security ... · The iSecurity Assessment offers an in depth...

Page 1: iSecurity Assessment - AS400 Software | Security ... · The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities

iSecurity Assessment

www.seasoft.com/isecurityassessment 1.800.272.7322

Page 2: iSecurity Assessment - AS400 Software | Security ... · The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities

iSecurity Assessment

the ProblemThe IBM i is often considered a secure operating system, resulting in the overlooking of system security. The consequence? A system breach can have serious consequences for your IBM i and your company.

It becomes a juggling act to identify and pinpoint security vulnerabilities and meet the compliance requirements of HIPAA, SOX, PCI and government agencies.

the SolutionThe iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities and areas of concern. The iSecurity Assessment provides a detailed report, which includes information on potential threats and vulnerabilities.

The iSecurity Assessment is non-•intrusive running on your PC, and not your IBM i

Reports on your system’s security •status within minutes

Receive industry best-practices •and recommendations to secure your IBM i

Page 3: iSecurity Assessment - AS400 Software | Security ... · The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities

the PromiSe- You will receive a thorough check of your IBM i Security status- Detailed, written analysis as well as scoring into the different aspects of your security make it easy to understand- The report will provide you with your results on:

the reSultSReceive the answers to:

Are controls and logging of remote •activity in place

Are you compliant with government •and private regulators

Are there too many high level •users on your IBM i with access

Are user sign on attributes •implemented proper

Are your security policies on par •with IBM’s recommended values

Are you detecting breach in real time•

User class•

User privileges•

System settings•

Exit points•

Sign on attributes•

Password control•

Network protection•

Unattended terminals•

Much More!•

SEA’s IBM i specialists are always on call and ready to discuss the results of your assessment, providing insight and suggestions to help secure your IBM i system.

www.seasoft.com/isecurityassessment 1.800.272.7322