Additional Information

Security and Compliance Automation

Provides pre-built profiles to support industry standards like Payment Card Industry Data Security Standard (PCI) v3, Department of Defense Security Technical Implementation Guide for Unix (DOD STIG), Control Objectives for Information and related Technology (COBIT), the Health Insurance Portability and Accountability Act Privacy and Security Rules (HIPAA), North American Electric Reliability Corporation compliance (NERC) and GDPR (General Data Protection Regulation (Regulation (EU) 2016/679))

Real-Time Compliance

Automatically monitors and provides immediate visibility to administrators when a change to the system violates a rule that is specified in the configuration policy, like changing the content or permission level of a security critical file.

Trusted Network Connect and Patch Management

Monitors the boot image, operating system, and applications for tampering, and verifies their integrity using the virtual trusted platform module (vTPM).

Trusted Boot

Monitors the boot image, operating system, and applications for tampering, and verifies their integrity using the virtual trusted platform module (vTPM).

Trusted Firewall

Ensures that every virtual machine has appropriate network isolation, and enables direct routing across specified virtual LANs that are controlled by the same Virtual I/O Server. By protecting VM to VM traffic within the server, without requiring an external firewall, application performance is improved.

Trusted Logging

Centrally stores AIX logs on the Virtual I/O Server in real time. This ensures tamper-proof logging as well as convenient log backup and management, and eliminates the need for log-scraping agents running on the OS.

Multi-Factor Authentication (offered separately)

Raises the assurance level of Power systems by requiring users to log in with multiple authentication factors. Designed for flexibility, so new authentication factors can be added as they become available.