Security


IBM i Security Without Breaking the Bank PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Robin Tatam   
Monday, 21 November 2016 00:00

Stop neglecting IBM i security. Consider a risk assessment and two control layers to enjoy substantially less risk of data losswithout sending your organization into the red.

robin tatamWritten by Robin Tatam

The time is now!


While some companies take a proactive stance on becoming more secure, many more act as a result of regulation. Governments and industry bodies have enacted numerous enforceable mandates, typically as a result of a scandal or high-profile breach. The growing list of these mandates includes PCI-DSS for credit card data, MAS-TRM for financial organizations in Singapore, BASEL for the banking industry, SOX for publicly traded companies, and HIPAA for those in the U.S. healthcare industry. Operators in the European Union face a dramatic increase in fines that may be levied for data breaches since the General Data Protection Regulation (GDPR) was adopted in April 2016. This replacement for the previous “directive” will become law in May 2018, and the financial impact on companies within this territory could be quite dramatic.

Add a comment
Last Updated on Friday, 18 November 2016 09:34
Read more...
 
The Lesser of Two Evils: Choosing the Better IBM i Security Configuration PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 November 2016 00:00

Carol describes scenarios where the configuration options aren’t optimal, but a choice must be made.

carol woodburyWritten by Carol Woodbury

By the time you read this, the election in the United States will be over. Many in the States view this election as having to choose between the lesser of two evils. While I’m not going to discuss the way I voted, I thought I might discuss some similar situationswhere I’ve been presented with two IBM i configurations to choose from, and neither is optimal.

Add a comment
Last Updated on Friday, 18 November 2016 00:00
Read more...
 
Tightening IBM i Security with Little Fear of Breakage PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Thursday, 20 October 2016 23:00

Carol describes five IBM i security settings that eliminate exposures and can be changed with very little risk of breaking anything.

carol woodburyWritten by Carol Woodbury

 

I know that many of you feel handcuffed. You want to make changes to improve your IBM i security posture, but your organization is so risk averse that it’s almost impossible to make changes that have the possibility of breaking a production process. While I can’t guarantee that these changes will not cause an issue, it’s unlikely that they will.

Add a comment
Last Updated on Thursday, 20 October 2016 13:10
Read more...
 
User Rating: / 1
PoorBest 
Popular Security Terms and How They Relate to IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Thursday, 15 September 2016 23:00

Carol describes terminology prevalent in the security world, explains what it means, and identifies how it applies to IBM i.

carol woodburyWritten by Carol Woodbury

I subscribe to several security-related newsletters. I was reading an article the other day, and it used the phrase “good security hygiene.” I thought I knew what that meant but did a bit of research to make sure. That experience made me think that it might be helpful to explain some security terminology and describe how it relates to IBM i. Let me start with the phrase that inspired this article.

Add a comment
Last Updated on Thursday, 15 September 2016 23:00
Read more...
 
5 Practical Ways to Use the Audit Journal to Solve your Administration Woes PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Thursday, 18 August 2016 23:00

The IBM i Audit Journal contains a wealth of information yet remains a mystery to those who can use it most. Carol describes practical ways that security and system administrators can use this information to help them in their daily jobs.

carol woodburyWritten by Carol Woodbury

The past few weeks, I’ve found myself helping our clients solve their issues by looking for specific entries in the audit journal. Most administrators think that the IBM i audit journal is only good for compliance reporting or just used during a forensic investigation. Nothing can be further from the truth. So I thought I’d share a few examples of how you can use the audit journal to solve daily problems. Or to help you debug problems or investigate administration-related issues.

Add a comment
Last Updated on Thursday, 18 August 2016 23:00
Read more...
 
TechTip: IBM i Audit Readiness—User Profile Cleanup PDF Print E-mail
Security - Compliance / Privacy
Written by Barbara Sims   
Thursday, 04 August 2016 23:00

Having proper policies and procedures in place is the key to maintaining user profiles.

Written by Barbara Sims

An audit of your IBM i security can be stressful—people coming in and looking at your policies and procedures for how you maintain the security on your system. This doesn’t need to be a time of anxiety. I actually love being audited. Or as I call it “Audit Season.” Not only am I able to show off how well my system is being secured, but I try to impart a little knowledge to the auditor on how IBM i security works its magic. Since I’m probably in the minority for liking audits, let’s discuss one thing that can be done to make your audit a little easier.

Add a comment
Last Updated on Wednesday, 03 August 2016 13:18
Read more...
 
Security Considerations for IBM i CL Commands PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Thursday, 14 July 2016 23:00

Carol answers the questions you’ve been asking about securing IBM i commands.

carol woodburyWritten by Carol Woodbury

Every once in a while, I get asked a question that spurs on an idea for an article. That’s what happened this week when I was asked whether one had to secure proxy commands. That made me realize that I hadn’t written about the security considerations one needs to make regarding Command Language (CL) commands, so I decided to make that the focus of this month’s column.

Add a comment
Last Updated on Thursday, 14 July 2016 23:00
Read more...
 
An Introduction to IBM i’s Row and Column Access Control (RCAC) PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Thursday, 30 June 2016 23:00

This is powerful stuff. You must understand the implications of and plan for the security aspects of an RCAC implementation.

carol woodburyWritten by Carol Woodbury

This article is adapted from IBM i Security Administration and Compliance: Second Edition, chapter 6.

 

Row and Column Access Control (RCAC) was introduced in V7R2 and brings the security implementation more in line with other DB2 implementations, providing administrators a way to filter what information is available without having to develop and manage logical files.

Add a comment
Last Updated on Thursday, 30 June 2016 23:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 47

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM