Security Scan

  • Identify, quantify, & prioritize vulnerabilities on your IBM i
    with our free network Security Scan.

Authority Broker

Powertech Security Scan for IBM i

Security Scan de Powertech™ is the place to start when you want to secure your IBM i (System i®, iSeries®, AS/400®). The free Scan provides a snapshot of your current system security in just 10 minutes. It runs directly from a network-attached PC, without modifying any system settings. The Security Scan audits common security metrics and displays the results in an easy-to-read, browser-based application. A Fortra Security Advisor helps you interpret the results, and you can print the findings for your records.

Security Scan Screen

Why Should I Run a Security Scan?

The Security Scan examines your system’s vulnerabilities, and suggests steps you can take to protect your critical data.

A Security Scan is:

  • Quick — The Scan runs in just 10 minutes

  • Confidential — Only you see the results

  • Thorough — A Security Advisor helps you understand the current state of your IBM i security

  • Clear — You'll understand where your system is secure and the areas that need work

You’ll find out where your IBM i security currently stands, whether your system is at risk, and how to improve data protection.

The Security Scan is a valuable tool for identifying areas of concern. It provided me with the right information to present to management so I can get the resources that I need to fix the issues.

Takeaways from the Security Scan

Input on Mitigating the IBM i's Biggest Vulnerabilities

We’ll walk you through the most common vulnerabilities that exist on the IBM I – such as excessive users with administrative privileges and misconfigured QSECURITY levels. We’ll provide you with detail on where they exist, how attackers go about exploiting them, and your organization’s readiness to defend against them and how it can be improved.

What Your Critical System Values Are Set to and Recommended Settings

The Security Scan will take an inventory of your critical system values and compare them to best practices benchmarks so that you can see which specific settings require remediation.

A PDF Report Summarizing Your Results

Results from the Security Scan will be compiled into a PDF report that offers in-depth evaluation of your security posture in the seven areas of security, including: user authorities, public authority, network access, FTP access, system security, user security, and system auditing.

Personalized Security Plan

One of our IBM i security experts will talk you through your results and provide you with an individualized plan regarding specific items that require remediation as well as which areas of security require attention and the best practices you should employ in addressing them.

What Do I Get after Running a Security Scan?

Security Scan

Results of your IBM i Security Scan are compiled immediately and presented for review in an easy-to-understand, browser-based, interactive reporting application. A Fortra Security Adviser can help you interpret the results, and you can save or print the findings for your records.

Security Scan does not leave files on your IBM i. The Security Scan application installs a licensed program to collect security data, but the files are removed upon completion of the analysis or you can remove the program manually using the DLTLICPGM command. You also have seven days after your Security Scan to make configuration changes and rerun the Scan to test your changes.

The Security Scan Reviews Critical Areas of IBM i Security:

The Executive Summary ranks the overall condition of your system. Red, yellow, and green indicators compare your system against best practices, along with references to the COBIT framework to which they apply.

Security Scan1

The Administrative Rights section reviews eight special authorities and the vulnerabilities of each.

Security Scan2

The public is any user with a profile and password, so this section indicates how accessible the system is to the average end user.

Security Scan3

The User Access section reviews user access to system data through common network access services, such as FTP, ODBC, and Remote Command.

Security Scan4

The FTP Access section identifies security vulnerabilities caused by using FTP (file transfer protocol) to transfer files between a client and server on a network.

Security Scan5

The System Security section examines key system values that control security settings on your system.

Security Scan6

The User Security section reviews how many user profiles haven't been used for at least 30 days and how many have default passwords, as well as reviewing basic password settings.

Security Scan7

The System Auditing section checks if you are using the IBM i event auditing capabilities and the types of events being audited.

Security Scan8

The Recommendations section provides suggestions for remediation based on the security checks performed on your system.

Security Scan9

Reference Material

Information (Web Site)

Note 1: Some of the content (images and texts) used in this page are property of Fortra

Request a Free Security Scan

The Security Scan is the first step to determine which aspects of your current configuration are putting your servers at risk. In just 10 minutes, and for free, you will get a complete overview of the vulnerabilities of your system, in addition to receiving advice from our experienced Computer Security professionals.

Success/Error Message Goes Here