Logo
Sign in
Product Logo
iSecurity Compliance EvaluatorRaz-Lee

iSecurity Compliance Evaluator automatically checks IBM i systems for compliance with industry regulations like PCI, SOX, and HIPAA. It generates customizable reports, enabling managers to quickly assess and address compliance issues.

DS-Compliance-Evaluator.pdf
iSecurity-…-Evaluator.pdf
Product details

iSecurity Compliance Evaluator

Imagine that each morning, when you reach the office, a customized compliance information sheet awaits for you. This is what iSecurity Compliance Evaluator will fo for you. With all this information available, you can easily ask your IT Manager to explain particular issues (rather than periodically having the IT manager manually check compliance status). The iSecurity Compliance Evaluator enables managers to quickly check the compliance of their systems with industry and corporate policies based on customizable user-friendly reports.

Key features

Evaluation at a Glance

iSecurity Compliance Evaluator can be scheduled to run automatically, and its results can be emailed directly from IBM i to the relevant person. Managers, auditors and administrators need a quick yet comprehensive view, analyzing the compliance of their systems with PCI, SOX, HIPAA and other regulations. With iSecurity Compliance Evaluator, managers can easily produce any number of compliance checklists, choose the contents and structure of the result, and attach different weights to each item.

Individual topic scores

Compliance Evaluator reports provide an overall compliance score, as well as specific ratings for topics comprising the compliance standard being evaluated. Individual topic scores are based upon the relative importance of the items comprising the topic and, of course, the item values. Status checks are provided for items such as System Values, Network Attributes, User Profile Attributes and Object Authorities.

Simple Way to Make Reports

Compliance Evaluator reports are based upon both static system data and time-sensitive data covering actual network transactions. Together, these can highlight unexpected changes in user activity, such as how often users access production or system files. The reports include operational information from QAUDJRN and from actual network activity. Virtually any type of information can be included.