Use IBM i exit point technology to log, control and audit network connected activity.
Monitor message queues and logs to send customizable real-time alerts via email, text or SIEM.
Instantly add an extra layer of protection to terminal sessions and in house applications.
Send text messages from the IBM i using native SMS instead of old fashioned email to text.
Uses IBM i journals to deliver powerful audit reporting down to individual users, files and fields.
Track changes to security configurations and send alerts for non-compliant events.
Self service password reset web portal enforces password controls with reduced admin overheard.
Secure critical data beyond the server with encrypted report distribution and secure intranet.
Leverage built-in IBM i cryptography to protect your most sensitive data.
Scan and isolate infected IFS files using integrated virus definition services.
Monitor your IBM i for ransomware attacks and automatically respond to threats.