Logo
Sign in
Product Logo
iSecurity Authority InspectorRaz-Lee

iSecurity Authority Inspector helps minimize threats by analyzing and comparing utilized versus required authorities on IBM i servers. It provides graphical analysis, supports authority collection commands, and assists in maintaining security best practices.

iSecurity-Authority-Inspector.pdf
DS-Authori…-Inspector.pdf
Product details

iSecurity Authority Inspector

Excessive amount of Users with High Authority, which leads to a major risk, because usually these Authorities aren’t disallowed over time. The iSecurity Authority Inspector supports the user regardless of the specific method in use. It enables comparison of utilized authority versus the required ones, and supports selection of the method. iSecurity Authority Inspector also provides information on the minimal authority to be given at each stage and the frequency of testing authorities. Helping managers and system administrators, to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge.

Key features

Minimizing Threats

SAuthority Collection commands, introduced in OS400 Ver. 7.3 – Start Authority Collection (STRAUTCOL), End Authority Collection (ENDAUTCOL) or Delete Authority Collection (DLTAUTCOL) are used to collect authority data during program run. Now that authority data is available, iSecurity Authority Inspector may be used to turn it into valuable information assisting the users in the mission of minimizing threats posed by excessive authorities.

Visualize Information at a Glance

iSecurity Authority inspector works with IBM’s Authority Collection data. It reads, summarizes and analyzes the data and presents it, with the analysis results, in graphs and tables. In some cases, the Authority Inspector presents the data in a more meaningful way to ease understanding.

Easy to use for non IBM i Users

The iSecurity Authority Inspector is installed on a PC that processes data from the IBM i, Identifying every security breach related to excessive authorities.

  • Runs on a PC that processes data from the IBM i
  • Automatically summarizes and analyzes the data
  • Advanced Filtering options to get accurate reports
  • Graphical User Interface