Kaita - IBM i System Access Manager

IBM i System Access Manager

Manage access to your IBM i system and data with System Access Manager.

System Access Manager, or SAM, protects the data on your IBM i with powerful and easy-to-maintain rules.

Leave a contact request!

Jätä yhteydenottopyyntö EN
Kaita Finland

System Access Manager

Manage access

IBM i is no longer an isolated platform free of security threats. Well-known network and open-source protocols are in use. This provides a wide surface for security attacks.

The data contained in IBM i is also often of high value to the business, making it an attractive target for data breaches.

SAM protects your IBM i system and the data it contains with powerful, flexible, and easy-to-maintain policies.

SAM supports compliance with security requirements by controlling access to IBM i and supports various standards, significantly reducing compliance time and costs.

Supported standards include SOX, GDPR, PCI-DSS, HIPAA, and CCPA.

Extending protection to the connection layer improves IBM i security

How does System Access Manager work?

SAM primarily uses exit point technology to detect access attempts to IBM i systems and data and to determine whether access should be granted or denied. These decisions are logged and the desired actions are taken.

The log data can be forwarded to the SIEM system.

SAM is governed by predefined rules. These rules contain the necessary information to let the program know how to act.

You also specify whether the event should trigger some other action, such as executing a command, disabling a user profile, sending a message, logging information, or running a program.

The right size partner

We are the right size partner. We are smooth and agile. We work with major equipment manufacturers and have selected the best and most reliable players on the market as our partners.

We are available 24 hours a day. You can always reach an expert who knows your environment.

Contact us
Kaita Finland

SEE ALSO OUR OTHER SERVICES

Our specialists can tell you more about the different options and additional services.

Kaita - IBM i Risk Assessment

IBM i Risk Assessment

Map the risks. IBM i Risk Mapping helps you identify threats, comply with requirements and improve your security posture.

Kaita - iSecurity Antivirus & Anti Ramsonware

iSecurity Antivirus & Anti-Ransomware

Advanced and comprehensive protection for IBM i against viruses, Trojans, and ransomware. 

Kaita - SIEM

SIEM

Knowing what is happening in the systems is a basic requirement for security. SIEM centrally monitors what is happening on the systems and alerts when necessary.