• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Kills Secure Perspectives Tool

    July 21, 2009 Alex Woodie

    IBM last week announced the withdrawal from marketing and discontinuance of support for Secure Perspectives, an i OS security tool introduced two years ago with the goal of allowing nontechnical people to define and implement an object-level security policy using nontechnical words and phrases. However, the product will continue to be available as a custom offering, as will updates that allow it to work with future releases of IBM i OS.

    Unveiled in April 2007 and shipped a month later, IBM introduced Secure Perspectives as a way to get more i5/OS shops to implement object-level security on their System i servers.

    Object-level security is one of the most powerful elements of security on this platform, as it explicitly controls which objects a user has access to and which objects they don’t. Even without other security precautions in place, such as exit point monitoring, if an organization has object-level security implemented, the chances of a major security breach are greatly minimized. (You can chalk up this feature to the AS/400’s amazing object-oriented architecture, which has been keeping AS/400 shops malware-free and [mostly] virus-free for decades, while Windows and Unix architecture, which lack this object-oriented nature, suffer the consequences of their file system attributes.)

    While object-level security is powerful, it can also be quite complex. Implementing object-level security can be a real challenge, and requires a good deal of technical expertise. IBM hoped to change that with Secure Perspectives, which sought to convert i5/OS-specific technical jargon into “natural language” terms. But judging from last week’s withdrawal from marketing and support, uptake of the product was not as high as IBM had initially hoped.

    Those who adopted Secure Perspectives are not left totally in the lurch. IBM will be phasing out the product over the course of the next couple of years. Effective October 19, customers will no longer be able to buy the Secure Perspectives version 1.2 tool, or a 12-month support package. Over the next two years, various support programs will be wound down. The final date listed is September 30, 2011, when the per-day licensing option for Secure Perspectives is withdrawn.

    In its announcement, IBM says the product “will continue to be available as a custom offering delivered by the IBM Systems Lab Services and Training Power Services team.” It goes on to say that “support and enhancements for this tool on future releases of IBM i will be offered as part of this Security Services offering.”

    In other words, if you pony up for IBM’s “custom offering,” you can continue to receive updates enabling you to use Secure Perspectives with i 6.2 and future releases. This will undoubtedly be more expensive than the $900 per-processor annual maintenance fee that IBM was initially charging (on top of the $1,500 per processor license fee). But if the product proved useful in these customer settings, it could be worth it to buy IBM’s custom offering.

    Customers may also be able to license Secure Perspectives from third-party resellers. For more information, see United States Withdrawal Announcement 900-155 at IBM’s Web site.

    RELATED STORIES

    IBM Ships Secure Perspective for System i

    IBM Addresses Object-Level Security with New Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Tune in to Profound Logic TV for FREE educational videos and tips
    Maximum Availability:  *noMAX - Subscription edition now available (US & UK)
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Pat Townsend Secure with New President Circumventing Two Limitations of CPYTOIMPF

    Leave a Reply Cancel reply

Volume 9, Number 28 -- July 21, 2009
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
Maximum Availability
Linoma Software
Tri-Delta Resources

Table of Contents

  • IBM Kills Secure Perspectives Tool
  • Bicycle Seller Rolls with Electronic Vaulting Backup and DR from UCG
  • JDA Shares Plans for E3 Fulfillment Products
  • Quadrant Adds a Slew of Updates to Forms Software
  • Kisco Gives i OS Auditing Tool a Web Makeover
  • CCSS Adds Syslog Support to QMessage Monitor
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization
  • Rimini Street Gets Equity Investment from Adams Street
  • Zobrist Offers Search-Friendly URLs for WebSphere Commerce
  • AIG-Israel Taps Raz-Lee for i OS Security Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9
  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.