Security


Case Study: PowerTech's IBM i Security Solutions PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Robin Tatam   
Friday, 24 October 2014 00:00

PowerTech's security software helps Seneca Gaming Corporation play the security game and win by auditing, monitoring, and controlling user activity.

robin tatamWritten by Robin Tatam

For centuries, the Seneca people have made their home in the western portion of what is now New York State. During their proud, rich history, they relied heavily on hunting, fishing, and agriculture for food. They were great con­querors and fierce adversaries, as well as sophisticated politicians with centuries of democratic savvy. By 1848, they had developed their own constitution and elective government, and officially became the Seneca Nation of Indians.

Add a comment
Last Updated on Thursday, 23 October 2014 11:06
Read more...
 
Technology Focus: The IBM i Isn't Immune to Security Problems! PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by John Ghrist   
Monday, 20 October 2014 00:00

The IBM i server's reputation for security is well-deserved, but it's not foolproof. Complacency and short-handed IT staffs contribute to the problem.

john gristWritten by John Ghrist

In a world where perfection is seldomif everfound, it's amazing how some users of IBM i servers manage to persuade themselves that their systems are "perfectly" protected from security threats. As news stories of Home Depots and Targets and other big-time vendors' data-security castles being breached become increasingly routine, in the IBM i world denial is still a thriving cottage industry: "No one would bother to try to breach our company's security; we're too small and our i is too secure."

Add a comment
Last Updated on Saturday, 18 October 2014 15:52
Read more...
 
User Rating: / 1
PoorBest 
Who's More Dangerous? The Person You Know or the Person You Don't Know? PDF Print E-mail
Security - General
Written by Carol Woodbury   
Friday, 17 October 2014 00:00

While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.

carol woodburyWritten by Carol Woodbury

I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sourcesthat is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topiccentered around the internal threat (breaches and incidents originating from within the organization)also provoked some interesting discussions. This month's article focuses on the internal threat and what the data doesand doesn'tshow. Here's what I learned.

Add a comment
Last Updated on Friday, 17 October 2014 00:00
Read more...
 
Adopted Authority: Friend or Foe? PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 September 2014 00:00

Carol discusses the pros and cons of using adopted authority.

carol woodburyWritten by Carol Woodbury

The answer to the question posed in the title of this article is "Yes." Let me explain. Adopted authority is very powerful and can be used as a method of elevating users' authority without actually giving them the authority directly. Adopted authority provides great flexibility, and I use it often when working with our clients. However, used without thought or with malice, adopted authority can pose a significant risk to your system. Perhaps for this reason, in some circles adopted authority has gotten a bad rap; the thought is that it's too dangerous and should be avoided at all costs. That's not my viewpoint, however. I'm a big fan of the power and flexibility of adopted authority, so let's look how it can be used safely.

Add a comment

Last Updated on Friday, 19 September 2014 00:00
Read more...
 
Tackling IBM i Enterprise Key Management PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Patrick Townsend   
Monday, 25 August 2014 00:00

The hardest part of security is encryption, and the hardest part of encryption is key management.

patrick townsendWritten by Patrick Townsend

For a variety of reasons, IBM i customers struggle when implementing the encryption of sensitive information. There is wide acceptance and knowledge that sensitive information should be encrypted, but there is also a large amount of fear about its implementation, especially around encryption key management. Concerns about performance, business continuity, and systems management are common in IBM i shops. In fairness, these are also concerns for users of other server platforms and operating systems, such as Microsoft Windows Server, Linux, and IBM System z mainframe.

Add a comment
Last Updated on Monday, 25 August 2014 00:00
Read more...
 
Security Patrol: The Hidden Dangers of Shadow IT PDF Print E-mail
Security - General
Written by Carol Woodbury   
Friday, 15 August 2014 00:00

Carol discusses the dangers of allowing IT projects outside of the IT team and the problems doing so can present to your organization.

carol woodburyWritten by Carol Woodbury

I've heard them called by several terms"rogue IT", "super users," and most commonly, "shadow IT"but essentially it's those users who perform duties that would normally be done by traditional IT staff…but these workers don't work for IT. Often, these workers have a background in IT, having moved from a position in IT to a position on the business side of the organization. They think that since they know how to perform these tasks (writing queries, replicating databases, developing complex spreadsheets, etc.), they might as well do the work. No harm, right?

Add a comment
Last Updated on Tuesday, 12 August 2014 14:47
Read more...
 
Security Patrol: V7R2 Security Enhancements, Part 2: Implementing Row and Column Access Controls PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 18 July 2014 00:00

Carol provides the second part of a two-part article on the security enhancements introduced in V7R2.

carol woodburyWritten by Carol Woodbury

Last month, I covered the auditing, password composition rule, and other miscellaneous enhancements provided in V7R2. This month, the focus is on the security enhancements associated with DB2, specifically Row and Column Access Control (RCAC).  

Add a comment
Last Updated on Wednesday, 16 July 2014 12:08
Read more...
 
User Rating: / 1
PoorBest 
Before Moving to the Cloud, Get Your Rain Gear On PDF Print E-mail
Security - General
Written by Carol Woodbury   
Monday, 14 July 2014 00:00

The key to success is planning.

carol woodburyWritten by Carol Woodbury

Since I live in Seattle, it's only fitting that I discuss the preparations you need to make prior to moving to the cloud. One requirement for living in Seattle is to be prepared for changing weather. It may be bright and sunny, and an hour later be overcast and raining. Native Seattleites know to carry an extra fleece and Gore-Tex rain jacketin other words, we're prepared. In terms of moving part of your business to the cloud, you must also be prepared. This article discusses preparations you need to make prior to moving to the cloud.

Add a comment
Last Updated on Friday, 11 July 2014 10:28
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 41

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM