Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The ASCENT Security and Compliance Portal consolidates all the resources necessary for adhering to various control frameworks into one accessible platform. With its continuous security evaluations and reminders for scheduled control tasks, alongside a comprehensive governance library and vendor management features, the ASCENT Portal streamlines the compliance process from start to finish. Users benefit from real-time visibility into their compliance status and reports, all from a single, reliable source. You can view real-time dashboards that highlight upcoming and overdue compliance obligations. An automated compliance calendar ensures that control owners remain organized and on schedule. Additionally, the portal offers a full governance library that is tailored to your control framework, facilitating the effective implementation of controls and fostering program acceptance. It also outlines security expectations for vendors and suppliers in accordance with your established policies and controls. Furthermore, it supports the management of the entire lifecycle of third-party relationships. Equipping employees with essential security and compliance training empowers them to be proactive in defending against both internal and external threats, ultimately enhancing your organization’s overall security posture. By utilizing this comprehensive platform, organizations can ensure a more robust and efficient compliance strategy.

Description

The Fresche IBM i Security Suite is an all-encompassing security, auditing, and intrusion detection solution that is optimized for cloud compatibility and tailored for IBM i systems, aiming to combat ransomware, cyber threats, and data breaches by enhancing governance, compliance, and operational effectiveness. It vigilantly oversees vital exposure points, such as IFS files, network connectivity methods (including ODBC, FTP, web applications, and sockets), and exit pathways, offering immediate alerts, lockdown capabilities, and established compliance reports. The suite features a centralized management system through an intuitive dashboard that enables visual monitoring, configuration of privilege escalation, enforcement of network access controls, and access to more than 360 pre-built compliance reports. Furthermore, it includes capabilities for user profile administration, management of access escalation, lockdown of inactive sessions, and oversight of privileged access to protect critical assets. Among its advanced functionalities are intrusion detection integrated with SIEM systems and field-level encryption and masking, which identify sensitive fields to bolster security measures. With its robust feature set, the suite stands as a vital tool in fortifying organizations against evolving security threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

HITRUST Assessment XChange
IBM i

Integrations

HITRUST Assessment XChange
IBM i

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$833 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ASCENT

Country

United States

Website

www.ascent-portal.com

Vendor Details

Company Name

Fresche Solutions

Founded

1976

Country

Canada

Website

freschesolutions.com/products/ibm-i-security-suite-2/

Product Features

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

Alternatives

iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security