What's your iSecurity?
Get a Free IBM i Security Assessment from SEA
Testing the integrity of your IBM iSecurity is the first step in prioritizing IBM i Security initiatives
The iSecurity Assessment offers an in depth look into the security of your IBM i and enables you to understand potential vulnerabilities and areas of concern in regards to various aspects of IBM i Security.
The iSecurity Assessment provides a detailed report, giving you the information you need to know about potential threats and vulnerabilities on your IBM i system.
The assessment installs and runs in five minutes or less, and generates a report, only you see.
Once completed, you'll have a consultation with one of our IBM i/AS400 security specialists who will help you better understand the results of your assessment, provide details into industry best practices, and give you suggestions and options to secure your IBM i/AS400 system.
Included with the iSecurity Assessment
With your free iSecurity Assessment we provide a non-intrusive detailed report that identifies security vulnerabilities over your IBM i systems and LPARS. The assessment is done from your PC without requiring command line access. After completion you'll be able to view potential security risks in areas such as:
- User class
- User privileges
- System settings
- Exit points
- Sign on attributes
- Password control
- Unattended terminals
A half hour complimentary consultation will follow the completion of the assessment. During the consultation, you and one of our support engineers will dig deeper into the details of the assessment and what it means for your business.
The assessment will answer questions such as:
- Are controls and logging of remote activity in place?
- Are there too many high-level access users on your AS400?
- Are you detecting a breach in real time?
- Can you deliver and meet the compliant requirements of government and private regulators?
Non-Invasive Assessment
The assessment installs on your PC, not on your IBM i, this non-intrusive test keeps your private data private.
Identify Areas To Address
Identify vulnerabilities and areas where enhancements to Security can be made in your company's IBM i current environment. Identify vulnerabilities and areas where enhancements to Security can be made in your company's IBM i current environment.
Quick and In-Depth