Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Atakama presents a unique information security solution that ensures business data remains protected from various attacks, even in scenarios where other security measures may falter. This platform allows for tailored security policies that align perfectly with your business requirements and user workflows. The priority of securing confidential data is paramount, whether it involves defending against external or internal threats. Atakama enables the safeguarding of sensitive materials, including earnings reports, personal identifiable information (PII), human resources records, merger and acquisition documents, engineering and scientific files, internal communications, investment strategies, and beyond. With the rising demand for encryption at the individual file level, and the growing complexity of state and federal cybersecurity regulations, organizations face heightened scrutiny and pressure. Ransomware incidents that lead to file theft and exposure can have catastrophic effects on any business. With Atakama, files are consistently encrypted on the client side, ensuring that only the encrypted versions of files are stored in the cloud or on servers, thereby enhancing overall data security and compliance. This robust approach to data protection not only mitigates risks but also fosters trust among stakeholders.

Description

The Fresche IBM i Security Suite is an all-encompassing security, auditing, and intrusion detection solution that is optimized for cloud compatibility and tailored for IBM i systems, aiming to combat ransomware, cyber threats, and data breaches by enhancing governance, compliance, and operational effectiveness. It vigilantly oversees vital exposure points, such as IFS files, network connectivity methods (including ODBC, FTP, web applications, and sockets), and exit pathways, offering immediate alerts, lockdown capabilities, and established compliance reports. The suite features a centralized management system through an intuitive dashboard that enables visual monitoring, configuration of privilege escalation, enforcement of network access controls, and access to more than 360 pre-built compliance reports. Furthermore, it includes capabilities for user profile administration, management of access escalation, lockdown of inactive sessions, and oversight of privileged access to protect critical assets. Among its advanced functionalities are intrusion detection integrated with SIEM systems and field-level encryption and masking, which identify sensitive fields to bolster security measures. With its robust feature set, the suite stands as a vital tool in fortifying organizations against evolving security threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM i

Integrations

IBM i

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$833 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Atakama

Founded

2014

Country

United States

Website

www.atakama.com

Vendor Details

Company Name

Fresche Solutions

Founded

1976

Country

Canada

Website

freschesolutions.com/products/ibm-i-security-suite-2/

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

BestCrypt Reviews

BestCrypt

Jetico

Alternatives

iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security
iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security
GhostVolt Reviews

GhostVolt

GhostVolt Ltd