Skip Ribbon Commands
Skip to main content
Gladiator Enterprise Information Security Services
Tell Me More Form Tell Me More Header Image

Thank you for your interest!

A ProfitStars representative will be contacting you soon.

Gladiator® Enterprise Security Monitoring™ (ESM)

This unique security monitoring layer provides expert 24x7x365 monitoring of your Jack Henry core and host system to prevent outside hacker attempts as well as internal security breaches

Gladiator Enterprise Security Monitoring is an additional security monitoring layer to handle the demands of today’s regulatory mandates regarding information security threats, including identity theft. ESM is a unique, fully-automated monitoring service that integrates with your core SilverLake or CIF 20/20 system and IBM Power host systems. In today’s regulatory environment, protecting customer information and guarding against identity theft has never been more critical to your business operations. ESM helps protect clients against “red flag” activities as mandated by the latest federal ID Theft Prevention Program requirements. Your core system is monitored 24x7, 365 days a year, by expert Gladiator security analysts who have extensive knowledge of the latest intrusion trends. Whether you seek protection for your core system from outside hack attempts or from unauthorized internal actions that cause security breaches, Gladiator ESM has you covered with the latest intrusion prevention services. Your institution can now protect the privacy, security, and confidentiality of non-public information. Having ESM’s protection layer in place also helps prove to regulators that your institution has adopted a proactive approach to protecting private customer data.

What It Does

  • Guards and monitors core systems 24 hours a day, seven days a week, 365 days a year via Gladiator information security experts.
  • Addresses the detection, prevention, and mitigation of “red flag” activities to help protect customers’ non-public confidential information.
  • Protects against today’s costly security threats that can interrupt normal business operations.
  • Tracks key events to core software systems and IBM Power host systems.
  • Provides integrated, near-real-time monitoring.
  • Audits events and sends alerts to the Gladiator Secure Operations Centers (SOCs) for key occurrences such as rate changes, changes to credit limits, changes in security accounts, failed authentication attempts, objects deleted or created, dormant account activity, intrusions detected, back-dated interest rate adjustments, user profile changes, and much more.
  • Promptly handles “high alerts” in an organized and timely manner through contacts with designated employees.
  • Includes built-in reporting features and a data storage vault.
  • Offers a daily e-mail summary of activity.
  • *Optional: Can be integrated with Gladiator’s device monitoring that protects firewalls, servers, hard drives, and more from outside hack attempts or unauthorized internal actions.

What It Does For Me

  • Provides peace of mind for core system security.
  • Assists institutions in complying with regulatory mandates including the Identity Theft Prevention Program Guidance (FACT ACT modifications) designed to proactively thwart identity theft.
  • Empowers IT professionals by providing detailed reporting about security threats that can be easily understood company-wide.
  • Gives board members accurate summary data that can be reviewed effectively.
  • Makes it easier than ever for organizational leaders to effectively manage the latest security threats.
  • Offers best-of-breed protection that allows CEOs and board members to sleep better at night.
  • Helps facilitate more successful IT exams.
Protect your core and host system with expert, 24x7 security monitoring
Knowledge Center
Enhance your security posture using a layered approach. Visit our Gladiator Knowledge Center for more information.