Powertech Command Security for IBM i
Powertech Command Security for IBM i gives you the ability to protect your system from the unrestricted use of commands that could allow users to access data or functions that affect your system’s security. By determining when selected commands are allowed and monitoring their use, you eliminate the potential for major security issues.
Maintain System Security:
Being able to monitor and control the execution of sensitive commands helps you safeguard your system against unauthorized changes or potentially harmful events.
Comply with Regulatory Initiatives:
Meet compliance requirements with a complete audit trail. Command Security for IBM i records when select commands are used, giving you the documentation necessary to meet industry regulations and standards.
Easy Setup:
You need security solutions that are quick to install and simple to learn so you can start reaping their benefits immediately. With Command Security for IBM i, installation is fast and features are intuitive—no programming required.
Why should I choose Command Security?
Complete Control
Choose commands to monitor and specify the criteria that will allow them to be executed or cause them to be rejected.
Full Audit Trail
Meet compliance requirements by recording command usage to a secure journal.
First-Rate Support
Get your questions answered by a real person 24/7.
Unparalleled Expertise
Partner with industry-leading IBM i security experts.
Monitor and Control IBM i Commands:
Keep your system safe by securing command usage
Commands run your IBM i, but unrestricted commands compromise your system's security.
Control the execution of IBM i commands to protect sensitive data and applications. With Command Security for IBM i, you can:
Choose sensitive commands to monitor
Specify the conditions under which a command should be secured
Define actions to take when command conditions are met
Prevent sensitive commands from being executed
Notify administrators when users issue particular commands
Modify sensitive commands in a predefined way, such as substituting command keywords or replacing the entire command
Record command useage to a secure journal to meet compliance requirements
Reference Material
Information (Web Site)
Note 1: Some of the content (images and texts) used in this page are property of Fortra