
iSecurity Compliance Evaluator automatically checks IBM i systems for compliance with industry regulations like PCI, SOX, and HIPAA. It generates customizable reports, enabling managers to quickly assess and address compliance issues.
Vendor
Raz-Lee
Company Website
iSecurity Compliance Evaluator
Imagine that each morning, when you reach the office, a customized compliance information sheet awaits for you. This is what iSecurity Compliance Evaluator will fo for you. With all this information available, you can easily ask your IT Manager to explain particular issues (rather than periodically having the IT manager manually check compliance status). The iSecurity Compliance Evaluator enables managers to quickly check the compliance of their systems with industry and corporate policies based on customizable user-friendly reports.
Key features
Evaluation at a Glance
iSecurity Compliance Evaluator can be scheduled to run automatically, and its results can be emailed directly from IBM i to the relevant person. Managers, auditors and administrators need a quick yet comprehensive view, analyzing the compliance of their systems with PCI, SOX, HIPAA and other regulations. With iSecurity Compliance Evaluator, managers can easily produce any number of compliance checklists, choose the contents and structure of the result, and attach different weights to each item.
Individual topic scores
Compliance Evaluator reports provide an overall compliance score, as well as specific ratings for topics comprising the compliance standard being evaluated. Individual topic scores are based upon the relative importance of the items comprising the topic and, of course, the item values. Status checks are provided for items such as System Values, Network Attributes, User Profile Attributes and Object Authorities.
Simple Way to Make Reports
Compliance Evaluator reports are based upon both static system data and time-sensitive data covering actual network transactions. Together, these can highlight unexpected changes in user activity, such as how often users access production or system files. The reports include operational information from QAUDJRN and from actual network activity. Virtually any type of information can be included.