Fresche Solutions

Security & Compliance Solutions for IBM i

If a ransomware attack occurs, are you confident that your IBM i (AS/400) data is protected? Fresche Security simplifies security management & SIEM integration, helping you achieve regulatory security compliance, monitor system access and guard your systems against modern cybersecurity threats. 

Intro to Fresche Security Suite

Comprehensive IBM i Security, Auditing & Intrusion Detection

Business-critical data on IBM i is not immune to ransomware, cybercrimes, and data theft. Key areas of exposure include the files and directories in your IFS and network connectivity such as ODBC, FTP, web server applications, and other socket connections. Use the Fresche Security Suite to increase governance and compliance, mitigate risk, and deliver greater operational efficiency.

Ransomware Protection

Monitor traffic to your IBM i through exit-point connections like FTP telnet and ODBC, as well as socket layer access.

Exit Point Security

Lock down, monitor, get real-time notifications and access pre-defined security compliance reports, making it easy to meet ongoing compliance and regulatory requirements.

Compliance & Auditing

Protect sensitive and confidential data against unauthorized access and viewing by encrypting, masking, and scrambling fields and data.

Data Encryption

Encrypt, mask, and scramble field values so you can protect your data and comply with security regulations such as PCI and HIPAA. Track sensitive data access and get real-time alerts when sensitive data is accessed by users.

Intrusion Detection & SIEM Integration

Identify the right data to analyze and get alerts to security incidents as they occur is vital to stop intrusions and minimize internal and external threats.

Multi-Factor Authentication (MFA)

Implement an extra layer of security on user account access by requiring token entry in addition to passwords.

Carol Woodbury
IBM i Security
Expert

Pauline Brazil Ayala
VP, Compliance &
Security Solutions

WATCH THE WEBINAR
Top 5 IBM i Security Vulnerabilities & Ways to Resolve Them
While IBM i is one of the most securable systems, misconfigurations can still leave your critical business data vulnerable to cyberattacks. View this session with IBM i security experts Carol Woodbury and Pauline Brazil Ayala to learn about critical vulnerabilities to look for on IBM i systems and effective, automated ways to remediate the issues.
Watch Now

A Modern Solution Stack to Secure Your
Business Against Threats

Uniquely created for IBM i, the Fresche Security Suite provides complete system monitoring capabilities to quickly uncover malware, malicious code and potential threats. Designed for ease of use, the software comes with a modern intuitive dashboard that provides real-time alerts, allowing you to deal with internal and external threats before they happen.

Centralized Management Console
TGCentral
Monitor security in complex environments and configure privilege escalation & network security from a single web-based console.
  • Visual Monitoring via Dashboard
  • Network Access Configuration
  • 360+ Built-In Compliance Reports
Security Management & Access Controls
TGSecure
Safeguard the business-critical assets stored on your IBM i with user profile management, access escalation management and inactive session lockdown.
  • Network/Exit Point Security
  • Object & IFS Security
  • Privileged Access Management
Security Auditing
TGAudit
Meet internal and external audit requirements and regulatory compliance mandates by simplifying data collection with robust reporting and flexible output.
  • Regulation Report Cards
  • Security & Configuration Reports
  • Data-level Auditing and Reporting
Security Event Monitoring & Alerting
TGDetect
Get real-time alerts that alert you to potentially suspicious system activity so you can quickly take action and protect your systems.
  • Advanced SIEM Integration
  • Email Alert Notifications
  • History Log and Command Monitor
Database Field Protection
TGEncrypt
Go beyond data encryption and provide an additional protection layer by masking and scrambling data that is visible to users.
  • Sensitive Field Identification Assistance
  • Field-level Encryption, Masking and Data Scrambling
  • Field-level Change Reporting
Multi-Factor Authentication
TGMFA
Quickly strengthen user authentication security for users who are signing into your organization’s IBM i systems.
  • QR Codes
  • OTP App-Generated Codes
  • Email or Text Token Authentication

IBM i Security Subscription Pricing - Flexible and Affordable Options for Businesses of All Sizes

Ransomware Protection | Exit Point Security | Compliance | SIEM Integration | Data Encryption | MFA

Safeguarding your systems shouldn't be difficult or break the bank. Securing your systems should be easy, affordable and without compromise. That's why we offer flexible models that allow you to choose the option that works best for your organization, enabling you to secure your data and protect your business.

Subscription License

Get full access to the Fresche Security Suite and protect your systems against ransomware, uncover vulnerabilities and ensure compliance.

Get Started Now
$833 per month
billed annually / per LPAR
  • Includes access to all features and modules:
    TGCentral, TGSecure, TGAudit, TGDetect, TGEncrypt and TGMFA
  • Unlimited Users
  • Technical support & onboarding
  • No upgrade or transfer fees

Custom Licenses

Looking for flexible one-time or unlimited licensing options, Fresche Security is also available via convenient enterprise models. Connect with us to learn more about our custom options.

Discuss Your Options
Enterprise Licenses Unlimited Licenses
Flexible Terms

IBM i Security Services

Partner with experienced IBM i (AS/400, iSeries) security professionals who can help you identify & prioritize vulnerabilities and guide you on improving your security position going forward.

Take Control of Your Security

Conduct an IBM i Security Audit Today!

Gain peace of mind and know where you stand by performing an IBM i security audit with the Fresche TGSecurity Suite. With just a few clicks, TGSecurity evaluates 47 critical points and delivers the results in a clear and concise pass/fail format. Don't wait any longer - take charge of your security today!
Free IBM i Security Audit

Resources

Webinars
Videos
Datasheet
cross