Solution Sheet

Assure System Access Manager v6.0

Take Control of Access to IBM i Systems and Data with Assure System Access Manager

The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognize the high value of data residing on an IBM i.

Assure System Access Manager, a feature of Assure Security and part of its Assure Access Control feature bundle, is a true global access control platform with a flexible, powerful, data-centric approach to securing access to your IBM i. Using IBM i exit point technology, Assure System Access Manager gives you control of a wide range of system and data access points, including:

  • Network protocols such as FTP, ODBC, DDM, DRDA, NetServer and Telnet
  • SQL statements such as STRSQL, RUNSQLSTM, RUNSQL, *EDRSQL and embedded SQL
  • CQE usage such as RUNQRY, WRKQRY, QQQQry and OPNQRYF
  • File opens using QSH, STRSQL, DSPPFM, UPDDTA and others
  • System and user commands issued from a 5250 session or remotely
  • Sockets
  • Jobs
  • And more

How Assure System Access Manager Works

Assure System Access Manager primarily uses exit point technology to detect access attempts to your IBM i systems and data, determine whether to accept or deny them, and optionally log those decisions and trigger actions.

Assure System Access Manager’s exit point programs are driven by precise and powerful rules defined for each access point. Rules contain information that allows the program to know:

  • When the rule applies to an access event
  • Whether to accept or deny the access
  • Whether to log the event
  • Whether an optional action should be launched for the event, such as executing a command, disabling a user profile, sending a message, writing a record in a log file or executing a program


  • Supports regulatory requirements for SOX, GDPR, PCI-DSS, HIPAA, CCPA and others
  • Significantly reduces the time and cost of achieving regulatory compliance
  • Satisfies security officers by securing access to IBM i systems and data
  • Enables implementation of security best practices
  • Quickly detects security incidents so you can efficiently remediate them