Command Security

  • Database Encryption Software for IBM i

Command Security

Powertech Command Security for IBM i

Powertech Command Security for IBM i gives you the ability to protect your system from the unrestricted use of commands that could allow users to access data or functions that affect your system’s security. By determining when selected commands are allowed and monitoring their use, you eliminate the potential for major security issues.

Maintain System Security:

Being able to monitor and control the execution of sensitive commands helps you safeguard your system against unauthorized changes or potentially harmful events.

Comply with Regulatory Initiatives:

Meet compliance requirements with a complete audit trail. Command Security for IBM i records when select commands are used, giving you the documentation necessary to meet industry regulations and standards.

Easy Setup:

You need security solutions that are quick to install and simple to learn so you can start reaping their benefits immediately. With Command Security for IBM i, installation is fast and features are intuitive—no programming required.

Why should I choose Command Security?

Complete Control

Choose commands to monitor and specify the criteria that will allow them to be executed or cause them to be rejected.

Full Audit Trail

Meet compliance requirements by recording command usage to a secure journal.

First-Rate Support

Get your questions answered by a real person 24/7.

Unparalleled Expertise

Partner with industry-leading IBM i security experts.

Monitor and Control IBM i Commands:

Keep your system safe by securing command usage

Commands run your IBM i, but unrestricted commands compromise your system's security.

Control the execution of IBM i commands to protect sensitive data and applications. With Command Security for IBM i, you can:

  • Choose sensitive commands to monitor

  • Specify the conditions under which a command should be secured

  • Define actions to take when command conditions are met

  • Prevent sensitive commands from being executed

  • Notify administrators when users issue particular commands

  • Modify sensitive commands in a predefined way, such as substituting command keywords or replacing the entire command

  • Record command useage to a secure journal to meet compliance requirements

Reference Material

Information (Web Site)

Note 1: Some of the content (images and texts) used in this page are property of Fortra