SRC Secure Solutions
  • Home
  • Products & Services
    • Network Security
    • IBM i Security
    • GDPR
    • Data Discovery
    • Data Encryption
    • Data Compression
    • Programmer productivity
    • Quantum Random Number Generator
    • Key Manager
    • Systems Management
    • User Environment Management
  • News & Media
    • News
      • Gartner Microsegmentation Guide
    • Newsletter
    • Customer Cases
    • Literature
    • Newsletters archive
    • Register
  • Downloads
    • Downloads
    • Documentation
    • Training
  • Contact
    • About Us
    • Partners
    • Contact
    • Sitemap
    • Support
    • Search ...
  • Account
    • Registration
    • User Login
SRC Secure Solutions
  • Home
  • Products & Services
    • Network Security
    • IBM i Security
    • GDPR
    • Data Discovery
    • Data Encryption
    • Data Compression
    • Programmer productivity
    • Quantum Random Number Generator
    • Key Manager
    • Systems Management
    • User Environment Management
  • News & Media
    • News
      • Gartner Microsegmentation Guide
    • Newsletter
    • Customer Cases
    • Literature
    • Newsletters archive
    • Register
  • Downloads
    • Downloads
    • Documentation
    • Training
  • Contact
    • About Us
    • Partners
    • Contact
    • Sitemap
    • Support
    • Search ...
  • Account
    • Registration
    • User Login

SUBSCRIBE

iSecurity DB-Gate

 

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.

Read more: iSecurity DB-Gate

iSecurity Compliance Evaluator

 

The iSecurity Compliance Evaluator provides managers, auditors and systems administrators a quick, network-wide, comprehensive overview of their IBM i server’s compliance level with government, industry and corporate regulations.

Read more: iSecurity Compliance Evaluator

iSecurity Command

iSecurity Command provides total control over system and user defined CL commands, regardless of how the CL command was entered. iSecurity Command provides the ability to control CL commands, their parameters, origin, context, the user issuing the CL command, etc., and provides easy-to-define ways to react to these situations. During CL command processing, iSecurity Command can Allow, Allow with Changes, Execute Different or Reject the CL command.

Read more: iSecurity Command

iSecurity Change Tracker

iSecurity Change Tracker is dedicated to automatically monitoring and logging object changes, especially those made to production libraries, at both the source and object levels. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.

Read more: iSecurity Change Tracker

iSecurity Multi System

iSecurity Multi System manages multiple systems from a single control point. When operating multiple systems or LPARs, iSecurity Mulit System allows you to define the tool once and it copies across all systems. Reports can be scheduled to run automatically from both GUI and green screens across the IBM i network. Data is merged and shown as a single view.

Read more: iSecurity Multi System

iSecurity Capture

iSecurity Capture is a 5250 screen tracking solution that silently photographs, saves and plays back user sessions on the IBM i  server. Screens are captured and stored in real-time, arranged according to individual capture 'sessions', easily retrievable, have flexible scrolling, and a powerful free-text search engine. iSecurity Capture works as both a stand-alone product and as a fully integrated module in the iSecurity suite.

Read more: iSecurity Capture

iSecurity Authority On Demand

iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips identifiable to auditors  in IBM i audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor's often stringent security requirements.

Read more: iSecurity Authority On Demand

iSecurity Audit

 

iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action.

Read more: iSecurity Audit

iSecurity Assessment

iSecurity Assessment is the no-cost, non-intrusive solution for easily identifying where the risks to your system are. It is a Windows-based program for in-depth analysis of the full scope of the IBM i server security strengths and weaknesses, pinpointing the security risks which should be addressed. The assessment runs on your PC and not your IBM i system and delivers a detailed report, grading each facet of IBM i security, with full explanations.

Read more: iSecurity Assessment

iSecurity AP-Journal

iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance.

Read more: iSecurity AP-Journal

Page 2 of 3

  • 1
  • 2
  • 3

Account Settings

  • Downloads
  • User Login

Partners

  • Escherware
  • Colortokens
  • Fortra
  • PKWare
  • Quintessence Labs
  • Raz-Lee Security
  • Metallic Threatwise

Introduction

SRC Secure Solutions bv is a Dutch company specialising in Multiplatform Software for Security and Security Compliance Management.
We built on more than 30 years experience of supplying state-of-the art ICT security solutions to large, medium and small organisations.

Explore

  • Home
  • Products & Services
  • News & Media
  • Downloads
  • Contact
  • Account

Contact

Baarnsche Dijk 12C
3741 LS Baarn
The Netherlands

+31 (0)20 5036001

Subscribe

Subscribe to receive our newsletter!

Newsletter envelope 2018 150x102


Email & Social Media Marketing by VerticalResponse

Copyright © 2024 - SRC Secure Solutions. All Rights Reserved.