The PowerTech Group is the leading expert in automated security solutions for Power Systems™ running IBM i (System i®, iSeries®, AS/400®), helping users manage today's compliance regulations and data privacy threats.
PowerTech products provide definitive security coverage for IBM i servers, including management of powerful user profiles, customized auditing and reporting, network access (exit program) control, real-time reporting of security events, real-time database monitoring, and command monitoring and control.
PowerTech also works to raise industry awareness of security issues and solutions by publishing an annual security study, and hosting security and compliance Webinars.
A PowerTech Security Advisor works with you to install, run, and interpret the Compliance Assessment results. You can ask questions and discuss corrective actions with the advisor.
You can run the Compliance Assessment against any number of systems within a 7-day period. Many customers adjust their security settings and rerun the Assessment to see the effect of their changes.
Depending on the size of the server, the data collection and analysis typically takes a few minutes. The results appear in a rich browser-based application, and can be viewed, printed, and stored for later review.
The Compliance Assessment application installs a licensed program product to collect the security data. When the analysis is complete, the process removes the files, or you can remove it manually using the DLTLICPGM command.
Although you can run the Assessment on your own, the Security Advisor is an expert at interpreting the findings. If a professional diagnostic review is free, why not take advantage of it?
The Compliance Assessment usually can be scheduled within a day or two of your request. You'll receive a WebEx invitation from the Security Advisor and we handle all of the preparation.
The Assessment is designed to create only a minimal impact, even on a production server. There's no significant performance overhead or disk space use. And, of course, no system settings are ever changed.
Assuming that the Assessment finds vulnerabilities, the Security Advisor and the Recommendations section of the Assessment provide remediation advice. And, for seven days, you can make configuration changes and rerun the Assessment to test your changes.