About
Giving too much system access to the wrong users can lead to catastrophic data corruption and loss. Limit the risk with privileged access management software. Powertech Authority Broker for IBM i protects corporate assets and audits user access in real time for maximum system security. Security best practices recommend limiting the number of privileged user accounts, but having too many user profiles with special authorities is one of the most common security lapses uncovered in IBM i audits. Give users the access they need to do their jobs—without giving too much. Maintain a record of everything a user does when they swap into a privileged profile. Using award-winning screen capture technology, Powertech Authority Broker for IBM i provides system administrators and IT leaders with an unparalleled view of user activity, helping to safeguard sensitive IBM i data.
|
About
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures.
- We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out.
- Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when.
- Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity
- IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use.
-All past, present, and future infrastructure is supported
- Responsive 24/7/365 customer support.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies searching for a powerful Identification and Access Management software
|
Audience
CTOs, CIOs, CISOs, DevOps, SREs, Infrastructure Engineers, Heads of Infrastructure
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$70/user/month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationFortra
United States
www.fortra.com/products/identification-and-access-management-software-ibm-i
|
Company InformationStrongDM
Founded: 2015
United States
www.strongdm.com/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Customer Identity and Access Management (CIAM) Features
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Database Features
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
|
||||||
Integrations
Amazon Athena
Amazon EKS
Amazon ElastiCache
Amazon RDS
Amazon Redshift
CentOS
CockroachDB
Debian
Digital.ai Agility
Google Kubernetes Engine (GKE)
|
Integrations
Amazon Athena
Amazon EKS
Amazon ElastiCache
Amazon RDS
Amazon Redshift
CentOS
CockroachDB
Debian
Digital.ai Agility
Google Kubernetes Engine (GKE)
|
|||||
|
|