• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Addresses Object-Level Security with New Tool

    April 17, 2007 Alex Woodie

    You have choices in how you implement security on your i5/OS server. Data-centric security implemented at the folder or object level is the most rigorous type of security you can implement, but it is also the toughest to deploy and maintain. To address this challenge, IBM last week unveiled Secure Perspective for System i, a new tool that uses natural language processing to make it easier to secure i5/OS machines at the object or folder level.

    Object-level security is powerful stuff on the i5/OS server. It gives administrators the ability to say what objects will be available to which users and when, and which objects users won’t be allowed access to. With object-level security properly implemented, system administrators can rest easy knowing their critical System i data and programs are protected from unauthorized access, even if they haven’t taken steps to clamp down network access via FTP, ODBC, or other easy routes of passage into unprotected i5/OS servers.

    But, obviously, it’s not all sweet potatoes on easy street. The rub on object-level security is that it’s difficult to implement, and that has been the case for many years. Several third-party vendors have jumped at the opportunity to put a layer of abstraction in front of the IBM commands with their own tools, to make it easier to get to the nirvana of object-level security. Now, IBM is addressing the complexity level, too, with Secure Perspective for System i.

    With Secure Perspective, IBM is providing a way for managers and executives without technical skills to have input into the implementation of object- and folder-level security. The software features a browser-based interface that allows non technical people to define a security policy, using “natural language” (i.e., not arcane i5/OS commands).

    After the non technical managers create their policy with Secure Perspective, and a systems administrator with technical skills has mapped the policy to the actual location of the data on the iSeries or System i server, then the changes are automatically implemented.

    Secure Perspective provides two other functions in addition to implementing object-level security. First, it includes a “what if” modeler that is designed to predict how a policy will affect the system, and identify potential problems that it may create. (Obviously, you wouldn’t want to accidentally restrict all your users from accessing the system–one of object-level security’s potential problems, and one of the reasons it has been difficult to implement.)

    The second additional function is the generation of compliance reports demonstrating object-level security, as well as reports detailing all security policy changes or deviations. You may have the most secure System i setup in the Lower 48, but nobody–including your auditor–is going to believe you unless you prove it to them with a report. This is why security reporting tools have become so important in this post-SOX world.

    Secure Perspective works i5/OS V5R3 and V5R4. The software will become available May 4. Licenses for the software start at $1,500 per processor. For ordering information, see the Software Announcement Letter.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Unlock the full potential of your data with Rocket Software. Our scalable solutions deliver AI-driven insights, seamless integration, and advanced compliance tools to transform your business. Discover how you can simplify data management, boost efficiency, and drive informed decisions.

    Learn more today.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Computer Keyes:  Rapidly convert *SCS printer files into black and white or full color PDF documents
    COMMON:  Join us at the 2007 conference, April 29 – May 3, in Anaheim, California
    VAULT400:  Securely archive data with Instant Back-Up & 24x7 Recovery

    IT Jungle Store Top Book Picks

    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Virtualization Can Hurt Security, Gartner Says Calling SQL Functions Directly From a High Level Language Program

    Leave a Reply Cancel reply

Volume 7, Number 15 -- April 17, 2007
THIS ISSUE SPONSORED BY:

LANSA
Aldon
COMMON
Computer Keyes
Twin Data

Table of Contents

  • Global Hires Beer, Rolls Out New Web Site
  • Oracle Declares a ‘Renaissance’ for J.D. Edwards World
  • Shield Launches ‘DR for the Masses’
  • IBM Addresses Object-Level Security with New Tool
  • More Details Emerge on Query/400’s Java-Based Replacement
  • LogLogic 4.0: A View to a Log
  • Raz-Lee Signs BOSaNOVA to Resell Security Software
  • Ericom Supports Windows Vista with PowerTerm WebConnect
  • EXTOL’s New ‘EDI Appliance’ Based on System i Express Model 515
  • SOAs Are Being Implemented at Large Companies, Evans Data Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle