Kisco Systems

iSecMap

IBM i Security Policy Management

iSecMap : Product Details

iSecMap is a security enforcement tool for the IBM i family of systems (Power System/i, i5, iSeries, AS/400).

Use iSecMap to stay on top of your security configuration and easily meet your audit requirements

For any system, your current security configuration is what is currently being enforced. You have probably worked hard to determine your exact security setup and what you want to do is maintain those settings. iSecMap will map your current security environment and then let you periodically check the environment to let you know what, if anything, has changed. It then lets you decide if you want to accept the change and make it part of your baseline or change it so that it conforms to the way you initially set it up.

Security items monitored include:

  • security system values
  • user profiles
  • group profiles (including supplemental groups)
  • authorization lists
  • library level security
  • exit point tracing (including changes to registered exit programs)

You can optionally monitor specific objects in specific libraries and file objects in any Integrated File System (IFS) path.

All security activity is logged in iSecMap and can be exported in available audit reports, with enhanced filtering

iSecMap includes a security check monitor that runs periodically to check the security environment for your system. Live reports of security changes can be issued to specific message queues on your system and by email to any email address that you register to the system.

Do you have questions about iSecMap? E-mail them to us


Licensing Information

iSecMap is available as Single or Multiple LPAR licenses with unlimited users.

Maintenance: Free for first year of ownership. See company policies section for more information.


Ordering Information

iSecMap is available for FREE 30 day trial.

Place your order here for a FREE trial of iSecMap.


Related Products:
> iResetMe
> SafeNet/i
> i2Pass MFA
> iFileAudit


More IBM i Security:
> IBM i Security Blog