Security


Adopted Authority: Friend or Foe? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 September 2014 00:00

Carol discusses the pros and cons of using adopted authority.

carol woodburyWritten by Carol Woodbury

The answer to the question posed in the title of this article is "Yes." Let me explain. Adopted authority is very powerful and can be used as a method of elevating users' authority without actually giving them the authority directly. Adopted authority provides great flexibility, and I use it often when working with our clients. However, used without thought or with malice, adopted authority can pose a significant risk to your system. Perhaps for this reason, in some circles adopted authority has gotten a bad rap; the thought is that it's too dangerous and should be avoided at all costs. That's not my viewpoint, however. I'm a big fan of the power and flexibility of adopted authority, so let's look how it can be used safely.

Add a comment

Last Updated on Friday, 19 September 2014 00:00
Read more...
 
Tackling IBM i Enterprise Key Management PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Patrick Townsend   
Monday, 25 August 2014 00:00

The hardest part of security is encryption, and the hardest part of encryption is key management.

patrick townsendWritten by Patrick Townsend

For a variety of reasons, IBM i customers struggle when implementing the encryption of sensitive information. There is wide acceptance and knowledge that sensitive information should be encrypted, but there is also a large amount of fear about its implementation, especially around encryption key management. Concerns about performance, business continuity, and systems management are common in IBM i shops. In fairness, these are also concerns for users of other server platforms and operating systems, such as Microsoft Windows Server, Linux, and IBM System z mainframe.

Add a comment
Last Updated on Monday, 25 August 2014 00:00
Read more...
 
Security Patrol: The Hidden Dangers of Shadow IT PDF Print E-mail
Security - General
Written by Carol Woodbury   
Friday, 15 August 2014 00:00

Carol discusses the dangers of allowing IT projects outside of the IT team and the problems doing so can present to your organization.

carol woodburyWritten by Carol Woodbury

I've heard them called by several terms"rogue IT", "super users," and most commonly, "shadow IT"but essentially it's those users who perform duties that would normally be done by traditional IT staff…but these workers don't work for IT. Often, these workers have a background in IT, having moved from a position in IT to a position on the business side of the organization. They think that since they know how to perform these tasks (writing queries, replicating databases, developing complex spreadsheets, etc.), they might as well do the work. No harm, right?

Add a comment
Last Updated on Tuesday, 12 August 2014 14:47
Read more...
 
Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 July 2014 00:00

Carol provides the second part of a two-part article on the security enhancements introduced in V7R2.

carol woodburyWritten by Carol Woodbury

Last month, I covered the auditing, password composition rule, and other miscellaneous enhancements provided in V7R2. This month, the focus is on the security enhancements associated with DB2, specifically Row and Column Access Control (RCAC).  

Add a comment
Last Updated on Wednesday, 16 July 2014 12:08
Read more...
 
User Rating: / 1
PoorBest 
Before Moving to the Cloud, Get Your Rain Gear On PDF Print E-mail
Security - General
Written by Carol Woodbury   
Monday, 14 July 2014 00:00

The key to success is planning.

carol woodburyWritten by Carol Woodbury

Since I live in Seattle, it's only fitting that I discuss the preparations you need to make prior to moving to the cloud. One requirement for living in Seattle is to be prepared for changing weather. It may be bright and sunny, and an hour later be overcast and raining. Native Seattleites know to carry an extra fleece and Gore-Tex rain jacketin other words, we're prepared. In terms of moving part of your business to the cloud, you must also be prepared. This article discusses preparations you need to make prior to moving to the cloud.

Add a comment
Last Updated on Friday, 11 July 2014 10:28
Read more...
 
Security Patrol: V7R2 Security Enhancements, Part 1 PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 June 2014 00:00

Carol provides the first part of a two-part article on the security enhancements introduced in V7R2.

carol woodburyWritten by Carol Woodbury

Each new release of IBM i provides some enhancements, but this version provides a plethora of security-related enhancementsso many that I need two articles to cover them all! I'll start with the areas that have been "tidied up."

Add a comment
Last Updated on Thursday, 19 June 2014 16:12
Read more...
 
2014 State of IBM i Security Study PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by PowerTech Group, Inc.   
Monday, 09 June 2014 00:00

This article introduces the white paper 2014 State of IBM i Security Study available free from the MC White Paper Center.

Written by The PowerTech Group, a Division of HelpSystems, LLC

 

You sleep soundly, knowing your business's data is protected by IBM i servers. Besides, who would attack your company when major corporations such as Neiman Marcus and Target have vulnerable data?

 

But then it happens.

Add a comment
Last Updated on Friday, 06 June 2014 14:11
Read more...
 
Security Patrol: What Do You Do with Those IBM-Supplied User Profiles? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 16 May 2014 00:00

Carol discusses what you shouldand shouldn'tdo with all of the user profiles that are provided with the IBM i operating system.

carol woodburyWritten by Carol Woodbury

When IBM i is installed, numerous user profiles are created on your system. With each release, more of these profiles are added that support various new features of the operating system or other IBM products. This article discusses how these profiles should be used as well as what not to do with them.

Add a comment
Last Updated on Thursday, 15 May 2014 13:02
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 40

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM