What is Powertech Network Security?

Powertech Network Security interfaces directly with IBM i network access points to control and audit network access requests. The ability to audit and control network access allows Network Security to provide Intrusion Detection, and to alert the system administrator when someone attempts unauthorized access through the network.

Network Security lets the system administrator easily configure all network access rules, including what users can perform what functions. For example, "Can Joan in Accounting download the Payroll Master file?," or more generically, "Can Joan use the file download function at all?"

Network Security also allows you to easily manage remote access by specifying which SNA device or IP address, or range of IP addresses, can perform critical functions, such as FTP. Its Switch Profile feature allows system administrators to customize levels of network access control for a user or a group of users. Using native IBM i security, Network Security Switch Profiles lets the administrator decrease, or even increase, a user's authority to data or services.

Increasing a user's authority is critical when IBM i is configured to allow "Application Only" access in which all data files are restricted from view by all users. Network Security does all this without the need to change your existing IBM i security scheme, saving valuable time and effort.

Network Security uses a secure audit journal to log all unauthorized attempts to gain access to IBM i data and services. This allows system administrators to receive alerts in real time when any unauthorized access is attempted.

When Network Security is installed on multiple systems in a network, the system administrator can use Powertech Central Administration to manage all Endpoints from a central Management System. Rules can easily be copied from one system to another, improving management efficiency. Security policy changes, for example, can be implemented across large networks with speed and precision. Furthermore, audits can ensure Network Security's Rules and configuration on Endpoints matches that of the Management System, and Remedies can be used to manage any discrepancy.

See Central Administration Administrator's Guide for more information on Central Administration.

Rule configuration can be managed using the classic green screen interface familiar to IBM i users, or using HelpSystem's Insite web browser interface, which grants access to most of Network Security's functions in a format compatible with both desktop and mobile devices. Insite's Dashboards offer a visual representation of network activity, as well as easy access to view and edit rules for multiple systems across your network when used in conjunction with Central Administration. See HelpSystem's Insite Help for more details.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.17 | 201803210423