DetectIT — Security Manager
All organisations are faced with the complicated task of identifying, providing and enforcing the best security policy for their individual business. The recent introduction of legally binding compliance regulations (Sarbanes-Oxley, PCI, Basel II, HIPAA) and information security standards (ISO27002, COBIT) has resulted in more focus on security and privacy issues, but the fundamental elements of security remain unchanged. Most successful interpretations of best of breed security standards involve a blend of user, system and application security.
With over 500 customers worldwide, Safestone’s business solution for the System i, DetectIT, has been specifically designed by security experts to improve the management of security and compliance across the most complex System i environments. The DetectIT security and compliance solution is fully audited software providing comprehensive policy compliance, intrusion detection, auditing management, exit point security, access control facilities, password management, profile management and centralized administration.
As security management is different for every organization, the DetectIT solution has been separated into several cost-effective core modules, which can be tailored to an individual organization’s specific needs. Whether a large corporate requiring a comprehensive and sophisticated security approach or an SME requiring basic reports to meet compliance and regulatory requirements, DetectIT can ensure all your requirements are met.
Security Manager Modules
Click on the links to find out more about a particular area:
- Compliance Center for i
Flexible query based reporting solution that simplifies the task of collecting and converting a vast array of audit, compliance and security events into compliance reports.
- Powerful User Passport
Protect corporate data by easily managing the number of powerful users and providing a comprehensive audit trail of activities.
- Security Audit & Detection
Comprehensive real time intrusion detection and alerting allowing pro-active management of security events and potential breaches.
- Risk & Compliance Monitor
Identifies policy compliance vulnerabilities by reporting against off the shelf policies (SOX, PCI, Basel II, ISO 27002 etc.) and in so doing helping to prepare organisations for audit.
- Network Traffic Controller
Exit point management and reporting tool for controlling remote access requests from networked devices.
- User Profile Manager
Powerful administration tool controlling user profiles and passwords resulting in appropriate levels of resource access control.
- Password Self Help
Delegates password resetting to the user maximising user productivity and freeing up the helpdesk.
- Multiple Systems Administrator
Enables centralized management of networked System i servers and partitions through a single point of control.
- Agent for RSA SecurID
Two factor user identification and authentication providing enhanced security, ensuring that access to sensitive data is protected both at sign-on, on demand and when accessed via the network.
- iConnect for RSA enVision
Monitors, captures, filters and configures data from the IBM i into relevant security event messages for correlation and aggregration into the enVision console.