Security and Compliance Automation
Provides pre-built profiles that are certified to comply with industry standards like the Payment Card Industry Data Security Standard (PCI) v3, Department of Defense Security Technical Implementation Guide for Unix (DOD STIG), Control Objectives for Information and related Technology (COBIT), the Health Insurance Portability and Accountability Act Privacy and Security Rules (HIPAA), and North American Electric Reliability Corporation compliance (NERC). It simplifies management by automating security and compliance configuration, auditing and monitoring.
Automatically monitors and provides immediate visibility to administrators when a change to the system violates a rule that is specified in the configuration policy.
Trusted Network Connect and Patch Management
Automatically detects any AIX system which boots, resumes or moves by live partition mobility into the virtual environment, and ensures it is at the prescribed install and security patch level. Provides alerts if a security patch is issued that affects compliance.
Monitors the boot image, operating system, and applications for tampering, and verifies their integrity using the virtual trusted platform module (vTPM).
Ensures that every virtual machine has appropriate network isolation, and enables direct routing across specified virtual LANs that are controlled by the same Virtual I/O Server. By protecting VM to VM traffic within the server, without requiring an external firewall, application performance is improved.
Centrally stores AIX logs on the Virtual I/O Server in real time. This ensures tamperproof logging as well as convenient log backup and management, and eliminates the need for log-scraping agents running on the OS.
Independently audits the virtualized network landscape against defined network segregation compliance policies. Gives clients the ability to monitor configuration drift.