Assure System Access Manager, a feature of Assure Security and part of its Assure Access Control feature bundle, is a true global access control platform with a flexible, powerful, data-centric approach to securing access to your IBM i. Using IBM i exit point technology, Assure System Access Manager gives you control of a wide range of system and data access points.
As a complete IBM i security solution, Assure Security includes features that assess risks, monitor for compliance, ensure data privacy and control access to your systems and data. Capabilities can be licensed individually to address specific security needs, or you can choose feature bundles that address the major security and compliance concerns of any security officer or IBM i administrator.
The Active-Active feature of Assure MIMIX HA facilitates replication between two or more active production servers by accessing the database using keyed replication rather than traditional positional replication. Simply put, instead of using row numbers to update or delete replicated data in a target table, keyed replication uses the row’s unique key.
Assure iOptimize provides extensive, easy-to-understand reports on objects, jobs, resource use, and more through an innovative and intuitive graphical interface. Even novice administrators can use it to keep IBM i servers running at peak performance.
In addition to preventing theft of data by criminal intruders, internal staff, contractors and business partners should only be allowed to see the specific data to which they are authorized. Assure Encryption, a feature of Assure Security and part of the Assure Data Privacy feature bundle, is trusted by organizations worldwide to protect their private data
Assure Elevated Authority Manager, a feature of Assure Security, and part of its Assure Access Control feature bundle, enables you to reduce the number of powerful IBM i user profiles in your environment by allowing you to easily elevate the authority of user profiles on an as-needed basis. Elevated authority can be granted by an administrator upon request or automatically based on preconfigured rules, and it can be limited to a specific command, day, time, IP address or other parameters.