Enforcive Power Packs

Preconfigured Packages of Mission-Specific Modules

Not sure you need the full Enforcive Enterprise Security Suite? We’ve created mission-critical Power Packs comprised of modules from the Enforcive Suite, as well as select add-on modules, to help you manage specific types of security operations, including network security, authority swaps, security monitoring, IBM i log transfers, and compliance.

 

Network Security Power Pack

Easily protect exit points, manage ports/IP addresses, and implement group policies across all of your IBM i environments. As an independent security layer on the IBM i, the Application Access Control module manages access to the TCP/IP network, blocks intruders and malicious users, and reduces data corruption liability. When Application Access Control is combined with the robust features of the Firewall Manager module, the Policy Compliance Manager module, and the other powerful modules in this Power Pack, your organization gains solid control over all vectors of external accessibility to IBM i.

Included Modules:

  • Application Access Control
  • Application Analyzer
  • Application Audit
  • Central Audit
  • Control Panel
  • ES Administration Roles
  • Firewall Manager
  • Management
 

Authority Swap Power Pack

This set of modules makes it possible for administrators to allow selected users to temporarily adopt the object authority and network permissions of a designated powerful user in order to accomplish a specific task. Authority swaps can be executed for individuals or designated groups of users. All actions performed and objects created under the authority swap are seen by the operating system as being done by the user who adopted the authority, not the powerful user whose authority was adopted.

Included Modules:

  • Alert Center
  • Application Access Control
  • Central Audit
  • Control Panel
  • ES Administration Roles
  • Report Generator
  • System Audit
 

Security Monitoring Power Pack

Essential Enforcive auditing, alerting, and reporting modules work in concert to provide in-depth security monitoring of your IBM i environments. Key modules are:

Central Audit
Enables full journal and audit-log analysis while providing tools to manage event categories in journal and logs. This module even provides its own logs for events not otherwise covered.

Alert Center
Incorporates built-in intrusion detection and alerting mechanisms for IBM i, providing real-time security and compliance monitoring with instant e-mail and pop-up alerts.

Report Generator
Provides a range of capabilities for defining, optimizing, distributing, and archiving security-related reports within your IBM i environment, giving administrators complete control over how critical system security data is integrated and presented in order to meet the specific needs of an organization.

Included Modules:

  • Alert Center
  • Central Audit
  • Control Panel
  • ES Administration Roles
  • File Audit
  • Management
  • Message Queue Audit
  • QHST Log Audit
  • Report Generator
  • SQL Statement Audit
  • System Audit
 

IBM i Log Transfer Power Pack

This array of powerful audit and other modules provides an efficient way to define, collect, and filter audit logs and event sets from IBM i environments and then transmit these to any log-management system or SIEM. Each data source can be analyzed using unique collection criteria, and administrators can specify where to transmit the extracted events. Administrators can choose to have data collected and transmitted either in real time or on a set schedule.

Included Modules:

  • Application Audit
  • Central Audit
  • Control Panel
  • Data Provider
  • ES Administration Roles
  • File Audit
  • Message Queue Audit
  • QHST Log Audit
  • SQL Statement Audit
  • System Audit
  • View Data
 

Regulatory Compliance Power Pack

Comprehensively document and manage regulatory compliance across all of your IBM i environments with this robust package of Enforcive compliance modules. The Policy Compliance Manager and Accelerator Package modules provide template-based control of native definition, deviation reporting, and remediation for SOX, PCI DSS, COBIT, and ISO 27002 regulations. The Field Encryption module enables powerful file- and field-level encryption, as well as data masking and scrambling. Other modules are included that make it easy to set up alerts and generate a variety of compliance reports.

Included Modules:

  • Accelerator Package
  • Alert Center
  • Control Panel
  • ES Administration Roles
  • Field Encryption
  • Policy Compliance Manager
  • Report Generator