Kisco Systems : IBM i Data Protection
While viruses and ransomware are real external threats, the majority of data protection risks are inside your local network. The IBM i is particularly susceptible because of its legacy dependence on menu security. Use these non-invasive tools to instantly add layers of protection.
Use IBM i exit point technology to log, control and audit network connected activity.
Instantly add an extra layer of protection to terminal sessions and in house applications.
Secure critical data beyond the server with encrypted report distribution and secure intranet.
Self service password reset web portal enforces password controls with reduced admin overheard.
Leverage built-in IBM i cryptography to protect your most sensitive data.
Scan and isolate infected IFS files using integrated virus definition services.
Monitor your IBM i for ransomware attacks and automatically respond to threats.