Data Security Software

Home Product Brochures

Product Brochures

Note that some items are in PDFacrobat_iconformat - to read them you must have Acrobat Reader.

Brochures:

Enterprise Security for IBM i
The single most comprehensive and easy to use security and compliance solution for IBM i (AS/400). With over twenty fully integrated GUI-controlled security, auditing and compliance modules, this software suite enables system administrators, security officers and auditors to easily manage security and compliance tasks efficiently and effectively.
Cross-Platform Audit
Enterprise-wide Compliance Event Monitor, built on the principles of database activity monitoring and log management, but focused on providing practical and relevant information about an organization’s critical systems.
Cross-Platform Compliance
Create, document, and maintain a clear security policy with multiple systems of diverse platforms. CPC allows organizations to quickly check if their security and system settings are in line with their IT policies or regulatory requirements.
Layers of Data Security
Having a layered defense is often used as a method to prevent failure. For the off chance that a layer does fail, there are multiple levels in place to stop the threat.
Enforcive Add-On Modules

Solution Overviews (IBM i):

Database Security on IBM i
Enterprise Security offers a wide array of tools for monitoring, securing, reporting, and alerting database activity related to IBM i.
Exit Point Security
Peace of mind regarding all external access to IBM i. With Enforcive, security officers can easily Collect, Monitor and Analyze exit point activity.
Compliance Management
Enforcive’s Policy Compliance Manager helps create, document, and maintain a clear security policy across an organization. As an optional module to the Enterprise Security suite, it allows organizations to quickly check if their security and system settings are in line with their IT policies or regulatory requirements.
Field Encryption Protection
A comprehensive platform for file and field level encryption, as well as for masking and scrambling.
Password Self Service
Password Self-Service (PSS) streamlines password management into an autonomous process that enables end-users of IBM i, Windows, Linux, AIX, and Open LDAP to securely manage their passwords independently.
PCI DSS 3.2 Compliance
The PCI DSS Accelerator Package fast-tracks PCI project timelines, improves project visibility for auditors and management while streamlining system setup, monitoring, access control, logging and auditing.
Data Provider
Collect important security events from the IBM i and provide them to an external consolidated log monitoring system.
Firewall Manager
Firewall Manager allows you to monitor and secure all inbound and outbound TCP/IP connections to your IBM i environments.
System Reporting
The Report Generator provides a complete solution for defining, optimizing, distributing and archiving reports within your IBM i environment.
File Protection
Enterprise Security File Protection is a powerful feature that allows you to control record level access to file objects in a way that complements the control afforded by the operating system’s built-in object authority. Like all other servers and services under Application Access Control, it is an additional layer of protection provided on top of the operating system and does not replace it.
Command Control
Command Control allows organizations to regulation the level of access users have to specific commands. It is an additional level of security which will secure any command.
Save File Encryption
Save file encryption for backups, providing the ability to encrypt and save entire libraries as well as individual objects.

Solution Overviews (Multi-Platform):

Enforcive Security for AIX
The Enforcive Cross Platform Security (CPS) suite of products provides a range of security auditing, compliance protection, and reporting capabilities for AIX and other server platforms as well as databases like MS SQL and Oracle databases.
Multi-Platform Compliance Management
Cross-Platform Compliance (CPC) provides template-based control of native definitions, deviation reporting and remediation. And because it is integrated within Enforcive’s central management system, the built-in intrusion detection and alerting mechanisms provide real-time security and compliance monitoring with instant e-mail and popup alerts, and optional integration with a Syslog server.

Datasheets:

CPA for IBM i
CPA for Windows
CPA for AIX
CPA for Microsoft SQL Server
CPA for Databases
CPA for Mainframe
Security for Mainframe (CICS/MVS)
Enforcive/Security for CICS is the answer to auditors' requirements of internal controls for the protection and auditing of your data. It addresses the difficult demands of industry and legal regulatory compliance such as PCI DSS, SOX and HIPAA through data protection, privacy and an easy-to-understand audit log.

White Papers:

Supporting GDPR on the IBM i
The General Data Protection Regulation (GDPR) is an upcoming Regulation of the European Parliament and the Council of the European Union. It is about giving individuals control over information concerning them and the protection of that information with the respect to processing and movement of data.
Template-Based Compliance Management for IBM i
White paper discussing the managing of compliance using templates, including an introduction to Enforcive's Policy Compliance Manager.
Achieving PCI 2.0 Compliance with Virtual and Cloud Computing with IBM i
This paper examines how a reference architec­ture addresses virtualization and cloud computing security risks, by expanding the scope of the card­holder data environment. It also looks at how IBM i is uniquely positioned to exploit the new cloud mar­ketplace, both in consuming software and services, and in delivering them. You’ll learn the significance of hypervisor design in minimizing vulnerabilities, how your PCI-DSS compliance posture must change, and how to select an architecture that works for your payment processing workflow.