R/Security Centre

 

 

 

 

Your very own Security Guard.

The new methods of accessing the AS/400 through TCP/IP services like FTP, ODBC/JDBC or through Rumba transfer and Client Access, require  only that the user has a valid user ID and password.  
Users can easily bypass the menu and application program security by using their user profile with a PC connection to download and upload data.
You CAN NOT RELY ON OS/400.

Please click on a branch

 Security Shield

The  Security Shield provides gives you immediate visibility and lets you manage all methods of external  access

R/Security Shield has been designed to monitor, control and audit access to your AS/400 through the following :

FTP using TCP/IP
Remote command execution through TCP/IP
Distributed Program Call
ODBC SQL type access
JDBC SQL type access

IBM Client Access
Client request access  (such as Rumba)
DDM file and submit remote command access
Client Access  remote command utility
Remote command execution through SNA or  IP
IFS

R/Security Shield gives you the visibility of accesses to your AS/400 and the ability to manage them.  You can reduce the level of authority a user has and restrict what data they have access to. R/Security Shield can be integrated with Automation tools for visual notification and escalation of violations.

Return to Top of Page

 Security Monitor

Visibility of access traffic to your AS/400

R/Security Monitor gives you the monitoring capabilities of R/Security Shield. You can monitor all of the following :

FTP using TCP/IP
Remote command execution through TCP/IP
Distributed Program Call
ODBC SQL type access
JDBC SQL type access

IBM Client Access
Client request access  (such as Rumba)
DDM file and submit remote command access
Client Access  remote command utility
Remote command execution through SNA or  IP
IFS

It is ideal to prove your security controls to auditors or to help define a future security project. Most companies have  such a project planned but need help knowing where to start, this solves that problem at a very low cost. Leave it running for a month and you will have a clear picture of what to address.

You can see what is happening, as it is happening.

Return to Top of Page

 FTP Manager

Complete management of FTP access

This is the FTP Component of R/Security Shield

Using FTP Manager you can manage which users have access to which files, with what authority, even from what locations. FTP access can be specifically enabled for sending, receiving, creating, renaming and listing files, creating or deleting libraries.  You can disallow specific FTP host OS/400 command usage to prevent back-door breaches. And much more…

FTP Manager can be configured and monitoring access to your AS/400 in less than 15 minutes, giving you instant visibility traffic of any security violations.

Return to Top of Page

 ODBC Manager

Complete management of FTP access

This is the ODBC / JBDC  Component of R/Security Shield. This works in similar way to FTP manager giving full control over ODBC and JDBC access

Return to Top of Page

 Client Access Manager

Complete management of Client Access traffic

This is the Client Access component of R/Security Shield. This works in similar way to FTP manager giving full control over Client Access traffic.

Return to Top of Page

 DDM Manager

Complete management of DDM access

This is the DDM  Component of R/Security Shield. This works in similar way to FTP manager giving full control over DDM access.

Return to Top of Page

 Remote Command Manager

Restrict users to specific remote commands

Remote Command Manager is a  Component of R/Security Shield. This restrict users to using only specifically allocated commands.

Return to Top of Page

 Limit / Allow 
Active Jobs

Assist shut down

This function helps shutting down access the user has to an AS/400.

It can be used to monitor activity and inform on how many active users and batch jobs are waiting to complete, hold selected list of job queues a group of users may use and restrict access to the AS/400 so a selected group can not sign on.

The  reverse of the limit active job is provided to allow users to sign on and release their job queues.

Return to Top of Page

 Profile Control

Control Access to the AS/400

This function provides some help to control access to the AS/400. Controlled access to the AS/400 can be used by operations to stop users signing on and allocating libraries, etc.

The function provides different ways of revoking access to users. These are :

Display a message window that can be defined to say why the user cannot get  access.

Use the IBM function of disabling the user profile.

The main benefit of this utility is when the user profile is a structured one, since the revoking method can be defined at partial user profile level (environment). A structured user profile is when a section of the profile means something other  than the user name.

Return to Top of Page

 Remote Access

Access Other Computers

This function allows access methods to be used by users to access other computers, not just AS/400's. Once the access method has been set up, the user can use the utility to display a list of remote systems to select. When selected, the utility will use the information set up to process the request to the remote system selected.

The utility was initially designed for AS/400's, so access can be set up to a remote system, which, when selected, can take the user to the remote system and automatically sign them on.  This can be used, so a user can take a menu option which signs them on at a remote system, displaying another menu. (Note the remote system must allow automatic sign on).

All passwords entered for automatic sign on are encrypted within the function.

The utility now has the ability to use other methods of access like TCP/IP. This means that if TCP/IP has been set  up, users can select access to other non-AS/400 computers.

Return to Top of Page

   Tel +44 (0) 1706 830565