Security


Popular Security Terms and How They Relate to IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 16 September 2016 00:00

Carol describes terminology prevalent in the security world, explains what it means, and identifies how it applies to IBM i.

carol woodburyWritten by Carol Woodbury

I subscribe to several security-related newsletters. I was reading an article the other day, and it used the phrase “good security hygiene.” I thought I knew what that meant but did a bit of research to make sure. That experience made me think that it might be helpful to explain some security terminology and describe how it relates to IBM i. Let me start with the phrase that inspired this article.

Add a comment
Last Updated on Friday, 16 September 2016 00:00
Read more...
 
5 Practical Ways to Use the Audit Journal to Solve your Administration Woes PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 August 2016 00:00

The IBM i Audit Journal contains a wealth of information yet remains a mystery to those who can use it most. Carol describes practical ways that security and system administrators can use this information to help them in their daily jobs.

carol woodburyWritten by Carol Woodbury

The past few weeks, I’ve found myself helping our clients solve their issues by looking for specific entries in the audit journal. Most administrators think that the IBM i audit journal is only good for compliance reporting or just used during a forensic investigation. Nothing can be further from the truth. So I thought I’d share a few examples of how you can use the audit journal to solve daily problems. Or to help you debug problems or investigate administration-related issues.

Add a comment
Last Updated on Friday, 19 August 2016 00:00
Read more...
 
TechTip: IBM i Audit Readiness—User Profile Cleanup PDF Print E-mail
Security - Compliance / Privacy
Written by Barbara Sims   
Friday, 05 August 2016 00:00

Having proper policies and procedures in place is the key to maintaining user profiles.

Written by Barbara Sims

An audit of your IBM i security can be stressful—people coming in and looking at your policies and procedures for how you maintain the security on your system. This doesn’t need to be a time of anxiety. I actually love being audited. Or as I call it “Audit Season.” Not only am I able to show off how well my system is being secured, but I try to impart a little knowledge to the auditor on how IBM i security works its magic. Since I’m probably in the minority for liking audits, let’s discuss one thing that can be done to make your audit a little easier.

Add a comment
Last Updated on Wednesday, 03 August 2016 14:18
Read more...
 
Security Considerations for IBM i CL Commands PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 15 July 2016 00:00

Carol answers the questions you’ve been asking about securing IBM i commands.

carol woodburyWritten by Carol Woodbury

Every once in a while, I get asked a question that spurs on an idea for an article. That’s what happened this week when I was asked whether one had to secure proxy commands. That made me realize that I hadn’t written about the security considerations one needs to make regarding Command Language (CL) commands, so I decided to make that the focus of this month’s column.

Add a comment
Last Updated on Friday, 15 July 2016 00:00
Read more...
 
An Introduction to IBM i’s Row and Column Access Control (RCAC) PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 01 July 2016 00:00

This is powerful stuff. You must understand the implications of and plan for the security aspects of an RCAC implementation.

carol woodburyWritten by Carol Woodbury

This article is adapted from IBM i Security Administration and Compliance: Second Edition, chapter 6.

 

Row and Column Access Control (RCAC) was introduced in V7R2 and brings the security implementation more in line with other DB2 implementations, providing administrators a way to filter what information is available without having to develop and manage logical files.

Add a comment
Last Updated on Friday, 01 July 2016 00:00
Read more...
 
Take an IBM i Security Quiz PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 17 June 2016 00:00

Carol provides a quiz to test your knowledge of IBM i security facts.

carol woodburyWritten by Carol Woodbury

Many times, I want to make sure to tell everyone about an interesting IBM i security feature or make sure everyone knows how something works or point out some quirky fact, but it really isn’t enough to write a full article on the topic. So I decided to communicate these topics via a quiz. I hope you enjoy this alternative means of learning about IBM i security!

Add a comment
Last Updated on Friday, 17 June 2016 00:00
Read more...
 
Book Review: IBM i Security Administration and Compliance, Second Edition PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Pat Botz   
Friday, 10 June 2016 00:00

If you have only one book for security administration and compliance on the IBM i, this is the one you should have.

patrick botzReviewed by Patrick Botz

IBM i Security Administration and Compliance, Second Edition, the latest version of Carol Woodbury’s well-known IBM i security reference, starts with Carol laying out her goals for the book, which are to provide the reader with choices, practical implementation examples, insight into the appropriate security scheme for your organization, and time-saving tips. I think she hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader to fundamental concepts of information security management.

Add a comment
Last Updated on Friday, 10 June 2016 00:00
Read more...
 
IBM i Exit Points: What They Are and When to Use Them PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 May 2016 00:00

Carol explains the concept of exit programs and provides examples of how they can be used to customize your IBM i administration.

carol woodburyWritten by Carol Woodbury

The terms “exit point” and “exit program” are often used but are rarely explained. New exit points are added to most IBM i releases, so I thought it might be helpful to explain exit points and provide some examples of how you might use them in your organization.

Add a comment
Last Updated on Friday, 20 May 2016 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 46

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM