Security


Fact or Fiction: Critical Security Flaws Are Found in IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 21 August 2015 00:00

Carol Woodbury discusses a recent presentation at Defcon asserting that there are critical security flaws in IBM i.

carol woodburyWritten by Carol Woodbury

As a security professional who's made her career espousing the virtues of IBM i security, it's disconcerting to receive an email from a client with the title, "New Critical Exploits for iSeries Announced at Defcon." Defcon for those of you who are not familiar, is one of the world's largest hacker conventions. It's held annually in Las Vegas. The presentation was called "Hack the Legacy! IBM i (aka AS/400) Revealed." Not that IBM i security is perfect or has never had flaws, but to see IBM i as the topic of a presentation at Defcon makes you sit up and take notice!

Add a comment
Last Updated on Thursday, 20 August 2015 12:55
Read more...
 
FTP on IBM i: Does It Honor the User Profile's Limited Capability Setting or Not? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 24 July 2015 00:00

Carol explains why you need to be concerned about profiles' limited capability setting when considering the risks FTP poses to your organization.

carol woodburyWritten by Carol Woodbury

Many IBM i shops continue to allow FTP to be run by all users (or I should say have done little or nothing to ensure only selected users can use FTP). The excuse that some administrators use is that their users have been configured as limited capability users, so what's the threat? This article describes the threat, even when a user is a limited capability user.

Add a comment
Last Updated on Friday, 24 July 2015 00:00
Read more...
 
User Rating: / 1
PoorBest 
2015 State of IBM i Security Study PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Help Systems, LLC   
Monday, 13 July 2015 00:00

Given the mission-critical data stored on these systems, maintaining a secure configuration should be a top priority.

Written by PowerTech, a HelpSystems company

Editor's note: This article introduces the white paper 2015 State of IBM i Security, which is free to download from the MC White Paper Center.

 

Another day, another data breach in the news. You tune it out—unless the details are as juicy as the Sony hack. Your corporate data and applications are safe on an IBM i server that your go-to IT guy set up years ago. No worries here!

 

But then your new system admin notices some strange activity on the network and realizes your system was breached ten months ago. That server you thought was so well-protected? Turns out, there were some security gaps that had never been addressed. With the legal fees and all the bad press, it might take just as long for the company to recover from the data theft.

Add a comment
Last Updated on Sunday, 12 July 2015 18:38
Read more...
 
Data Masking and Assuring Security During Software Testing PDF Print E-mail
Security - Compliance / Privacy
Written by Green Light Technology   
Monday, 06 July 2015 00:00

Your production data could be more exposed than you think during software testing.

Written by Green Light Technology

Editor's note: This article introduces the white paper "A Road Map to Successful Data Masking," which is available free from the MC White Paper Center.

 

Data masking during software testing (or otherwise) is not the simple process that the uninitiated might suppose. Gone are the days when replacing personally identifiable information with random characters makes the grade. Obfuscating data for use in development, testing, and QA environments means you need to be able to quickly provide teams with secure sets of consistent, meaningful data that can be used again and again. But this can be difficult to achieve, particularly in geographically dispersed organizations, and especially if you don't adopt a systematic, centralized approach to de-identifying sensitive data.

Add a comment
Last Updated on Thursday, 02 July 2015 09:50
Read more...
 
What's Hot: Secure File Transfers on IBM i. What's Not: FTP PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Bob Luebbe   
Monday, 22 June 2015 00:00

Organizations must rethink how file transfers are secured and controlled within the organization.

bob luebbeWritten by Bob Luebbe

Every day, millions of files are transmitted around the world by corporations, government, and other organizations. These electronic transfers include the critical data needed to conduct business, such as customer and order information, EDI documents, financial data, payment information, as well as employee and healthcare information.

 

File Transfer Protocol (FTP) has been used for decades to transmit vital information, but this popular protocol has serious security risks that should not be ignored.

Add a comment
Last Updated on Monday, 22 June 2015 00:00
Read more...
 
The Benefits of a Strong Security Implementation…Beyond Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 June 2015 00:00

Carol explains the benefits of implementing the features of IBM i security…beyond the obvious security-related benefits.

carol woodburyWritten by Carol Woodbury

While the benefits of using the integrated features of IBM i security are obvious—confidentiality of data, data integrity, fully audited, etc. —benefits beyond the obvious exist. Let's take a look.

Add a comment
Last Updated on Friday, 19 June 2015 00:00
Read more...
 
Tips for Preparing for an IBM i Audit PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 15 May 2015 00:00

Audits may not always be your favorite activity, but there are a few things you can do ahead of time to prepare and make it less painful.

carol woodburyWritten by Carol Woodbury

Many administrators go through what I call the "audit fire drill" when they hear they're about to undergo an audit. My desire is to help eliminate some of the panic when preparing for an audit by giving you some tips to follow.

Add a comment
Last Updated on Friday, 15 May 2015 00:00
Read more...
 
When Management Turns Its Back on Security: The Business Effects PDF Print E-mail
Security - General
Written by SkyView Partners, Inc.   
Tuesday, 28 April 2015 00:00

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.

Add a comment

Last Updated on Tuesday, 21 April 2015 13:57
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 43

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM