Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
IBM PowerSC is a robust security and compliance solution specifically designed for virtualized settings on IBM Power servers operating with AIX, IBM i, or Linux. It effectively combines security functionalities across various layers of the IBM Power server architecture, allowing for streamlined management of security and compliance across all IBM AIX and Linux on Power systems. PowerSC adheres to widely recognized industry standards such as PCI DSS, HIPAA, and GDPR by offering preconfigured security profiles tailored to meet these requirements. Among its notable features is real-time compliance monitoring, which grants administrators instant visibility into any system modifications that breach configuration policy rules. Additionally, it incorporates trusted boot technology to verify the integrity of the boot image, operating system, and applications through the use of virtual trusted platform modules. The solution also includes a trusted firewall that guarantees proper network isolation for virtual machines, as well as trusted logging that ensures tamper-proof logging and efficient log backup and management. Furthermore, it supports multifactor authentication to enhance security protocols and safeguard sensitive information against unauthorized access. This comprehensive suite of features makes IBM PowerSC an essential tool for maintaining security and compliance in modern virtual environments.
Description
Stacklet is a Cloud Custodian-based solution that provides a complete out-of-the box solution that offers powerful management capabilities and advanced features for businesses to realize their potential. Stacklet was developed by Cloud Custodian's original developer. Cloud Custodian is used today by thousands of globally recognized brands. The project's community includes hundreds of active contributors, including Capital One, Microsoft, and Amazon. It is growing rapidly. Stacklet is a best-of breed solution for cloud governance that addresses security, cost optimization and regulatory compliance. Cloud Custodian can be managed at scale across thousands cloud accounts, policies, and regions. Access to best-practice policy sets that solve business problems outside-of-the box. Data and visualizations for understanding policy health, resource auditing trends, and anomalies. Cloud assets can be accessed in real-time, with historical revisions and changed management.
API Access
Has API
API Access
Has API
Integrations
AWS CloudTrail
AWS Config
AWS Security Hub
Amazon GuardDuty
Amazon QuickSight
Amazon SES
Amazon Web Services (AWS)
Google Cloud Platform
IBM Power Servers
Jira
Integrations
AWS CloudTrail
AWS Config
AWS Security Hub
Amazon GuardDuty
Amazon QuickSight
Amazon SES
Amazon Web Services (AWS)
Google Cloud Platform
IBM Power Servers
Jira
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/powersc
Vendor Details
Company Name
Stacklet
Founded
2020
Country
United States
Website
stacklet.io
Product Features
Product Features
Cloud Cost Management
Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting
Cloud Management
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Policy Management
Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management