Assure Security

Comply with cybersecurity regulations and strengthen IBM i security

Request Free Risk Assessment

Assure Compliance Monitoring

Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately.

Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms.

Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view.

Customer Story: Assure Monitoring and Reporting alerts Heinz Watties Australia to security exceptions in real time

Assure Security
Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
Secure access to critical information

Assure Access Control is a bundle of three Assure Security features that control access to IBM i systems and their data. The features can also be licensed separately.

Assure Multi-Factor Authentication strengthens logon security for configured users. Certified for RSA SecurID, Assure Multi-Factor Authentication also supports RADIUS servers or a Precisely-provided authenticator.

Assure Elevated Authority Manager automatically grants higher levels of user authority on an as-needed and time-limited basis, while comprehensively monitoring the actions of elevated profiles. Rules define the context in which authority can be granted and the method to be used for elevating authority.

Assure System Access Manager provides control of all entry points into IBM i systems, including network protocols, communications ports, database protocols, and command lines. Granular rules control access based on user profile settings, date and time, IP address and more.

Customer story – Corpbanca Bank uses Assure Security products to enhance transaction auditing and access-control capabilities


Assure Data Privacy

Assure Data Privacy protects data from unauthorized access through encryption, tokenization and masking. Its Assure Encryption and Assure Secure File Transfer features are also available separately.

Assure Encryption defends data at-rest using the only NIST-certified AES encryption for IBM i. It also offers built-in masking and access auditing.

FIPS 140-2 compliant Alliance Key Manager from Townsend Security, and other OASIS KMIP-compliant key managers, are supported for encryption key management. Extensive tokenization capabilities are also offered to temporarily or permanently replace sensitive data with token values.

Assure Secure File Transfer shields data moving across networks from view and automates transfers. Files are encrypted for transfer using common protocols such as Secure Shell (SSH SFTP) or Secure FTP (SSL FTPS). Optional PGP encryption protects data at the source and destination.

Customer Story: Assure Security helped Campbell County, Wyoming’s IT team take control of their system access

Assure Security Risk Assessment

With cyber-attacks increasing, regular security risk assessments are a critical part of any comprehensive IT security program. Many compliance regulations, such as PCI DSS and HIPAA, require annual IT risk assessments. Unfortunately, not all security auditors understand the special security features of IBM i, and not all IBM i administrators have the knowledge or the time to conduct regular, thorough security assessments.

To help organizations proactively understand IBM i security risks, Assure Security Risk Assessment is provided with Assure Security and any of its features. It thoroughly examines over a dozen categories of security values, reports on findings and delivers recommendations for addressing vulnerabilities. A higher-level summary report is provided for managers.

Security risk assessment services are also available through Precisely Global Services to perform the assessment and advise on remediation steps.

Request Free Risk Assessment


Maintain compliance
Achieve and maintain compliance with the cybersecurity requirements of GDPR, PCI DSS, HIPAA, SOX and other state and industry regulations
Stop breaches
Detect and effectively address security breaches and compliance deviations quickly
Protect privacy
Protect the privacy of your company’s intellectual property and prevent the theft of customer, partner, and employee data
Assess risk
Limit IBM i security threats by routinely assessing risks and taking control of logon security, powerful authorities, and system access

Want to learn more?

Artboard 1 copy 38


IBM i Security Insights for 2020

Artboard 1 copy 38


IBM i Encryption 101

Artboard 1 copy 35


Essential Layers of IBM i Security Series – Security Configuration