TechTips / Security


Partner TechTip: Automatic Audit Reports Are as Easy as 1-2-3 PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 23 September 2011 00:00

PowerTech Compliance Monitor 3 adds automated security and compliance reporting.

robin_tatamWritten by Robin Tatam

Remember the humorous MasterCard commercials from a few years ago? In my mind, I see one of them going like this:

 

State-of-the-art, 64-bit, multi-core Power7 hardware: $225,000

Highly securable IBM i operating system: $100,000

Discovering you can generate and distribute audit reports automatically: PRICELESS

Add a comment
Last Updated on Friday, 23 September 2011 00:00
Read more...
 
Partner TechTip: Command Access Can Bring Unexpected Consequences PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 12 August 2011 00:00

PowerTech Command Security controls command use on your system.

robin_tatamWritten by Robin Tatam

Recently, I was approached at a tradeshow by the CIO of an organization running IBM Power Systems servers. He asked if I could help with a security dilemma his company had encountered. It seems that they had recently experienced an "unplanned outage" after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.

Add a comment
Last Updated on Thursday, 11 August 2011 09:43
Read more...
 
TechTip: Passwords Are Key to AIX Security PDF Print E-mail
Tips & Techniques - Security
Written by David Tansley   
Friday, 05 August 2011 00:00

Ensure that your users have strong passwords.

david_tansleyWritten by David Tansley

Within any operating system, password maintenance is an important system admin task, and AIX is no different. So let's look at some password maintenance techniques.

 

Within AIX, you can specify rules in password administration. The most common ones are these:

Add a comment
Last Updated on Friday, 05 August 2011 10:07
Read more...
 
Partner TechTip: We've Been Hacked! But What Did the Intruder Access? PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 15 July 2011 00:00

PowerTech DataThread provides critical visibility into data access.

robin_tatamWritten by Robin Tatam

2011 is quickly becoming the "Year of the Breach." Although the sun has barely set on the summer solstice, we've already heard of significant breaches at financial giants Citi and Bank of America, gaming organizations Sony PlayStation Network and Sega, and a number of well-known household names like Google, Michael's, Netflix, and Best Buy. While the cause of these events varied, the majority of them resulted in illegal access to confidential data. And, in the case of Netflix and Bank of America, a trusted employee simply handed the information to criminal outsiders.

Add a comment
Last Updated on Thursday, 14 July 2011 12:37
Read more...
 
Partner TechTip: (Audit-Tested and Audit-Approved) Instant Authority! PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 24 June 2011 00:00

PowerTech Authority Broker provides a safe way to inherit authority by using a powerful IBM i feature.

robin_tatamWritten by Robin Tatam

In last month's TechTip, I spent some time talking about how users can inherit authority through group profiles. Despite my strong support of group profiles, I warned of the vulnerabilities of groups when not carefully architected. Inheritance of a group's private and special authorities can make users far more powerful than their base profiles might suggest. This risk increases if users are assigned to multiple groups. To help manage this, I suggested using PowerTech Compliance Monitor to quickly and easily report on a user's special authority—including those authorities gained via inheritance from a group.

Add a comment
Last Updated on Friday, 24 June 2011 00:00
Read more...
 
Partner TechTip: Group Profiles: Inheriting More Than You Bargained For PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 13 May 2011 00:00

Inherited authorities can be a hidden vulnerability if not carefully controlled.

robin_tatamWritten by Robin Tatam

Everyone loves an inheritance! Imagine the excitement of discovering that a long-lost uncle has left you a fortune. Or perhaps the recent Royal Wedding has you wondering where you are in the line of succession for the throne of England! While these possibilities are a long shot for most of us, you can inherit power on IBM i using the age-old IBM i facility called "group profiles."

Add a comment
Last Updated on Thursday, 12 May 2011 08:33
Read more...
 
TechTip: Control User Profile Sign-On Behavior PDF Print E-mail
Tips & Techniques - Security
Written by Steve Pitcher   
Friday, 11 February 2011 00:00

Don't waste time coding CL programs to disable and re-enable profiles. Instead, use commands that the fine folks at IBM have made just for that purpose!

steve_pitcherWritten by Steven C. Pitcher

We've all had user profiles we wanted under our thumbs a little tighter.

 

Let's say you have a couple of temporary work-term students who will be at your company for the next six months. What happens? Chances are you are verbally notified by their manager the day they arrive with the expectation of a laptop, email account, and IBM i access. Then you set them up like any other user, along with instructions on how to operate the old-school coffee machine, of course. Six months go by, and you've forgotten all about those kids who've now gone back to school. Perhaps someone in HR will let you know they're gone and give you a formal request to disable their profiles, but I think that's more the exception than the rule in most shops.

Add a comment
Last Updated on Friday, 11 February 2011 00:00
Read more...
 
User Rating: / 3
PoorBest 
Partner TechTip: A New Start in Security for a New Year PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 21 January 2011 00:00

This is a corporate New Year's resolution you can't afford to break.

robin_tatamWritten by Robin Tatam

The champagne corks, confetti, and party favors have all been swept up and discarded, marking the demise of yet another busy year. Now it's time to refocus and regroup with new personal and professional resolutions. While weight loss and smoking cessation are typical personal goals, security and compliance continue to be top corporate initiatives—and with good reason. The yet-to-be-released 2011 PowerTech "State of IBM i Security" study continues to report inadequate security controls among a rising tide of regulations and security violations.

Add a comment
Last Updated on Friday, 21 January 2011 00:00
Read more...
 
User Rating: / 1
PoorBest 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 4 of 17

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM