50 likes | 131 Views
Authority on Demand Flexible Access Control Solution. The Challenge. Emergency access to critical application data and processes is a very common security breach which is uncovered in System i audits.
E N D
The Challenge Emergency access to critical application data and processes is a very common security breach which is uncovered in System i audits. Currently, manual approaches to this problem are not only error-prone, but do not comply with regulations and auditor’s often stringent security requirements. System i sites define user’s security levels and allocate security rights corresponding to the different job responsibilities in the organization.
AOD Features • Easy to Use - simplifies granting special authorities when necessary, and incorporates easy-to-use reporting and monitoring mechanisms. • Add/Swap Security Levels (unique to iSecurity AOD) - grants a new security authority level or adds additional security rights on request. • Authority Transfer Rules & Providers - enables pre-defining special authority "providers" and special authority transfer rules. • Safe Recovery from Emergency - enables recovering from different types of emergency situations with minimum risk of human error. • Full Monitoring Capabilities - logs and monitors all relevant activities, and sends audit reports and real-time e-mail alerts when employees request higher authority. • Part of End-to-End Solution - solidifies iSecurity's position as the most comprehensive security solution for System i environments. • Intuitive GUI Interface – AOD is suitable for non-technical staff. • Controlled Access – AOD allows only relevant personnel to access critical data and processes.
Thank You! Please visit us at www.razlee.com