While viruses and ransomware are real external threats, the majority of data protection risks are inside your local network. The IBM i is particularly susceptible because of its legacy dependence on menu security. Use these non-invasive tools to instantly add layers of protection.
Use IBM i exit point technology to log, control and audit network connected activity.
TWO FACTOR AUTHENTICATION
Instantly add an extra layer of protection to terminal sessions and in house applications.
SECURE DATA DISTRIBUTION
Secure critical data beyond the server with encrypted report distribution and secure intranet.
Self service password reset web portal enforces password controls with reduced admin overheard.
MAX DATA PROTECTION
Leverage built-in IBM i cryptography to protect your most sensitive data.
FILE SYSTEM PROTECTION
Scan and isolate infected IFS files using integrated virus definition services.
AUTOMATED THREAT RESPONSE
Monitor your IBM i for ransomware attacks and automatically respond to threats.