IBM i System Access Manager
Manage access to your IBM i system and data with System Access Manager.
System Access Manager, or SAM, protects the data on your IBM i with powerful and easy-to-maintain rules.
Leave a contact request!
System Access Manager
Manage access
IBM i is no longer an isolated platform free of security threats. Well-known network and open-source protocols are in use. This provides a wide surface for security attacks.
The data contained in IBM i is also often of high value to the business, making it an attractive target for data breaches.
SAM protects your IBM i system and the data it contains with powerful, flexible, and easy-to-maintain policies.
SAM supports compliance with security requirements by controlling access to IBM i and supports various standards, significantly reducing compliance time and costs.
Supported standards include SOX, GDPR, PCI-DSS, HIPAA, and CCPA.
Extending protection to the connection layer improves IBM i security
System Access Manager (SAM) provides access control for IBM i systems. It is a flexible and efficient way to implement access management for IBM i.
Identify security breaches quickly so they can be remediated efficiently.
The exit-point technology used by SAM allows IBM i to be effectively protected. The system is easy to use and has a low impact on system performance.
How does System Access Manager work?
SAM primarily uses exit point technology to detect access attempts to IBM i systems and data and to determine whether access should be granted or denied. These decisions are logged and the desired actions are taken.
The log data can be forwarded to the SIEM system.
SAM is governed by predefined rules. These rules contain the necessary information to let the program know how to act.
You also specify whether the event should trigger some other action, such as executing a command, disabling a user profile, sending a message, logging information, or running a program.
The right size partner
We are the right size partner. We are smooth and agile. We work with major equipment manufacturers and have selected the best and most reliable players on the market as our partners.
We are available 24 hours a day. You can always reach an expert who knows your environment.
SEE ALSO OUR OTHER SERVICES
Our specialists can tell you more about the different options and additional services.
IBM i Risk Assessment
Map the risks. IBM i Risk Mapping helps you identify threats, comply with requirements and improve your security posture.
iSecurity Antivirus & Anti-Ransomware
Advanced and comprehensive protection for IBM i against viruses, Trojans, and ransomware.
SIEM
Knowing what is happening in the systems is a basic requirement for security. SIEM centrally monitors what is happening on the systems and alerts when necessary.