Accelerator Package

 

Jump-Start Your Compliance Efforts with Predefined Reports, Alerts, and Templates

The Enforcive Accelerator Package add-on module provides an extensive set of predefined reports, alerts, and templates that are mapped to relevant sections of the SOX, PCI DSS, COBIT, and ISO 27002 compliance regulations. Containing more than 600 definitions, the Accelerator Package can be fully customized to address the specific requirements of your organization.

By fast-tracking project timelines and improving project visibility for auditors and management, the Accelerator Package streamlines your compliance system setup, monitoring, logging, and reporting efforts. And the package also includes a block of consulting hours to help with your implementation.

Benefits

  • Jump-starts your company’s compliance efforts
  • Includes additional alert, report, and compliance templates
  • Offers a frame of reference to configure your IBM i environments to be in line with regulatory requirements
  • Provides easy-to-build and quick-to-deploy reports and alerts based on existing templates
  • Includes a block of consulting hours
 

Regulations and Standards Covered by the Accelerator Add-on

SOX
The Sarbanes-Oxley Act of 2002 (SOX) applies to public companies that operate in or outside the U.S. It aims to ensure that company executives and directors are accountable to the organization and that controls are in place for financial reporting.

PCI DSS 3.2
The Payment Card Industry Data Security Standard is the industry standard that businesses use to safeguard credit card payment data before, during, and after purchase. PCI Data Security Standard (PCI DSS) version 3.2 replaced version 3.1 to address growing threats to customer payment information.

COBIT 4.1
COBIT is a framework created by the Information Systems Audit and Control Association (ISACA) for developing, implementing, monitoring, and improving IT governance and management practices.

ISO 27002
ISO 27002, which replaced ISO 17799, provides organizations with best-practice recommendations on information security management. It’s designed for use by those responsible for initiating, implementing, or maintaining security systems.