DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.
The iSecurity Compliance Evaluator provides managers, auditors and systems administrators a quick, network-wide, comprehensive overview of their IBM i server’s compliance level with government, industry and corporate regulations.
iSecurity Command provides total control over system and user defined CL commands, regardless of how the CL command was entered. iSecurity Command provides the ability to control CL commands, their parameters, origin, context, the user issuing the CL command, etc., and provides easy-to-define ways to react to these situations. During CL command processing, iSecurity Command can Allow, Allow with Changes, Execute Different or Reject the CL command.
iSecurity Change Tracker is dedicated to automatically monitoring and logging object changes, especially those made to production libraries, at both the source and object levels. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.
iSecurity Multi System manages multiple systems from a single control point. When operating multiple systems or LPARs, iSecurity Mulit System allows you to define the tool once and it copies across all systems. Reports can be scheduled to run automatically from both GUI and green screens across the IBM i network. Data is merged and shown as a single view.
iSecurity Capture is a 5250 screen tracking solution that silently photographs, saves and plays back user sessions on the IBM i server. Screens are captured and stored in real-time, arranged according to individual capture 'sessions', easily retrievable, have flexible scrolling, and a powerful free-text search engine. iSecurity Capture works as both a stand-alone product and as a fully integrated module in the iSecurity suite.
iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips identifiable to auditors in IBM i audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor's often stringent security requirements.
iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action.
iSecurity Assessment is the no-cost, non-intrusive solution for easily identifying where the risks to your system are. It is a Windows-based program for in-depth analysis of the full scope of the IBM i server security strengths and weaknesses, pinpointing the security risks which should be addressed. The assessment runs on your PC and not your IBM i system and delivers a detailed report, grading each facet of IBM i security, with full explanations.
iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance.