TechTips / Security


Partner TechTip: Is Your IBM i "House" Built on a Solid Foundation? PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 13 April 2012 00:00

PowerTech Compliance Monitor 3 lets you preview the effect of security level changes.

robin_tatamWritten by Robin Tatam

Each year, PowerTech's popular "State of IBM i Security" study reports on the assigned value of the IBM security system value, QSECURITY. While many systems now are running at the IBM recommended minimum level of 40, there are still numerous organizations that are running at level 30 and even (gasp!) level 20.

Add a comment
Last Updated on Tuesday, 10 April 2012 12:43
Read more...
 
Partner TechTip: The Road to Security: Evaluate Your Server for Free PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 02 March 2012 00:00

PowerTech's Compliance Assessment performs a valuable service to hundreds of IBM i shops each year.

robin_tatamWritten by Robin Tatam

With the New Year and a new operating budget, it's time for many companies to start a security project. However, based on some of the calls I've received recently, there remains a lack of clear direction regarding the tasks and priorities.

Add a comment
Last Updated on Friday, 02 March 2012 00:00
Read more...
 
User Rating: / 1
PoorBest 
Partner TechTip: Our System Administrator Did WHAT? PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 20 January 2012 00:00

Are your powerful users accountable for their actions?

robin_tatamWritten by Robin Tatam

One of the greatest challenges an organization faces when securing an IBM i environment is protecting the system from the very people who are charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need that level of access 24 hours a day—and definitely not without accountability.

Add a comment
Last Updated on Tuesday, 17 January 2012 13:24
Read more...
 
Partner TechTip: What's Your Compliance Score? PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 16 December 2011 00:00

PowerTech Compliance Monitor scorecards make easy work of a tedious, but critical, task.

robin_tatamWritten by Robin Tatam

One of the most common requests I receive from customers is a way to provide the management team and auditors with a simple dashboard-type report of a system's configuration and its conformance with a baseline policy. For single systems, this can be a time-consuming task, prone to human error. When there are tens, or even hundreds, of system partitions, the work involved can become prohibitive.

Add a comment
Last Updated on Friday, 16 December 2011 00:00
Read more...
 
User Rating: / 1
PoorBest 
Partner TechTip: Don't Let Security Events Occur Unnoticed! PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 04 November 2011 00:00

PowerTech's Interact product monitors critical security events in real time.

robin_tatamWritten by Robin Tatam

Let's face it; monitoring security events on IBM i servers probably isn't at the top of anyone's "bucket list." However, it's a critical process that every organization should perform to ensure that unauthorized activities don't occur unnoticed. Typically, there are two main issues with monitoring a system manually: 1) you have to deliberately (and repeatedly) check to see if something has happened, and 2) you are probably looking for the proverbial needle in a haystack of logged events.

Add a comment
Last Updated on Friday, 04 November 2011 00:00
Read more...
 
User Rating: / 1
PoorBest 
Partner TechTip: Automatic Audit Reports Are as Easy as 1-2-3 PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 23 September 2011 00:00

PowerTech Compliance Monitor 3 adds automated security and compliance reporting.

robin_tatamWritten by Robin Tatam

Remember the humorous MasterCard commercials from a few years ago? In my mind, I see one of them going like this:

 

State-of-the-art, 64-bit, multi-core Power7 hardware: $225,000

Highly securable IBM i operating system: $100,000

Discovering you can generate and distribute audit reports automatically: PRICELESS

Add a comment
Last Updated on Friday, 23 September 2011 00:00
Read more...
 
Partner TechTip: Command Access Can Bring Unexpected Consequences PDF Print E-mail
Tips & Techniques - Security
Written by Robin Tatam   
Friday, 12 August 2011 00:00

PowerTech Command Security controls command use on your system.

robin_tatamWritten by Robin Tatam

Recently, I was approached at a tradeshow by the CIO of an organization running IBM Power Systems servers. He asked if I could help with a security dilemma his company had encountered. It seems that they had recently experienced an "unplanned outage" after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.

Add a comment
Last Updated on Thursday, 11 August 2011 09:43
Read more...
 
TechTip: Passwords Are Key to AIX Security PDF Print E-mail
Tips & Techniques - Security
Written by David Tansley   
Friday, 05 August 2011 00:00

Ensure that your users have strong passwords.

david_tansleyWritten by David Tansley

Within any operating system, password maintenance is an important system admin task, and AIX is no different. So let's look at some password maintenance techniques.

 

Within AIX, you can specify rules in password administration. The most common ones are these:

Add a comment
Last Updated on Friday, 05 August 2011 10:07
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 4 of 18

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM