Logo
Sign in
Product Logo
Security AssessmentRaz-Lee

Security Assessment is a free Windows-based tool for analyzing IBM i security. It identifies strengths and weaknesses, providing a detailed report with explanations. Users receive a free consultation with security specialists to understand results and improve security.

iSecurity-Assessment.pdf
DS-Assessment.pdf
Product details

iSecurity Assessment

iSecurity Assessment is a FREE Windows-based program for in-depth analysis of the full scope of the IBM i (AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of IBM i security, with full explanations. Every client has a free consultation with one of our IBM i / AS400 security specialists who will help you better understand the results of your assessment, provide details into industry best practices, and give you suggestions and options to secure your IBM i system.

Key features

The Assessment Report

Security Assessment checks your systems’ security-related definitions and values and reports – in minutes – the exact strengths and weaknesses of your IBM i security policies.

  • If the network is really protected
  • If ports are wide open to intruders
  • If user sign-on attributes are implemented properly
  • If auditing policies are performing as necessary
  • How secure the network would be by using iSecurity
  • If security policies adhere to IBM’s recommended values
  • The common denominator for object authorities
  • If the network is detecting security breaches in real-time
  • If there is a minimum number of power users defined

Compliance Check

Thorough and comprehensive – checks ALL aspects of your system security. Based on this it suggests iSecurity products required for maximum security and compliance

  • Performs a thorough check on the efficiency of your System i
  • Hyperlinks help navigate through different sections
  • Provides colorful, graphically-displayed results
  • Provides a detailed written analysis of security policy efficiency
  • Numerical scores help explain results
  • Covers user class, user privileges, system settings, exit points, sign-on attributes, password control, network protection, unattended terminals, and more.