• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Kills Secure Perspectives Tool

    July 21, 2009 Alex Woodie

    IBM last week announced the withdrawal from marketing and discontinuance of support for Secure Perspectives, an i OS security tool introduced two years ago with the goal of allowing nontechnical people to define and implement an object-level security policy using nontechnical words and phrases. However, the product will continue to be available as a custom offering, as will updates that allow it to work with future releases of IBM i OS.

    Unveiled in April 2007 and shipped a month later, IBM introduced Secure Perspectives as a way to get more i5/OS shops to implement object-level security on their System i servers.

    Object-level security is one of the most powerful elements of security on this platform, as it explicitly controls which objects a user has access to and which objects they don’t. Even without other security precautions in place, such as exit point monitoring, if an organization has object-level security implemented, the chances of a major security breach are greatly minimized. (You can chalk up this feature to the AS/400’s amazing object-oriented architecture, which has been keeping AS/400 shops malware-free and [mostly] virus-free for decades, while Windows and Unix architecture, which lack this object-oriented nature, suffer the consequences of their file system attributes.)

    While object-level security is powerful, it can also be quite complex. Implementing object-level security can be a real challenge, and requires a good deal of technical expertise. IBM hoped to change that with Secure Perspectives, which sought to convert i5/OS-specific technical jargon into “natural language” terms. But judging from last week’s withdrawal from marketing and support, uptake of the product was not as high as IBM had initially hoped.

    Those who adopted Secure Perspectives are not left totally in the lurch. IBM will be phasing out the product over the course of the next couple of years. Effective October 19, customers will no longer be able to buy the Secure Perspectives version 1.2 tool, or a 12-month support package. Over the next two years, various support programs will be wound down. The final date listed is September 30, 2011, when the per-day licensing option for Secure Perspectives is withdrawn.

    In its announcement, IBM says the product “will continue to be available as a custom offering delivered by the IBM Systems Lab Services and Training Power Services team.” It goes on to say that “support and enhancements for this tool on future releases of IBM i will be offered as part of this Security Services offering.”

    In other words, if you pony up for IBM’s “custom offering,” you can continue to receive updates enabling you to use Secure Perspectives with i 6.2 and future releases. This will undoubtedly be more expensive than the $900 per-processor annual maintenance fee that IBM was initially charging (on top of the $1,500 per processor license fee). But if the product proved useful in these customer settings, it could be worth it to buy IBM’s custom offering.

    Customers may also be able to license Secure Perspectives from third-party resellers. For more information, see United States Withdrawal Announcement 900-155 at IBM’s Web site.

    RELATED STORIES

    IBM Ships Secure Perspective for System i

    IBM Addresses Object-Level Security with New Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Chilli IT

    Chilli is one of the UKs leading IBM support and management providers with 20 years’ experience in the power and storage industry. Our bespoke solutions for maintenance, security and infrastructure delivers a service which is cost effective, increases productivity and enhances efficiency. Our ethical approach and unrivalled knowledge has secured business partnerships with blue-chip companies in the technology, retail, banking and travel sectors.

    As an IBM Business Partner, we provide you with the peace of mind that you are working in partnership with a company accredited to the highest standard. Our team of experts have worked together for many years and deliver projects which include consolidation, High Availability, Operating System upgrades; and backup and recovery installations.

    Contact us to see how we can help your business with IBM support and management.

    www.chilli-it.co.uk

    info@chilli–it.co.uk

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Tune in to Profound Logic TV for FREE educational videos and tips
    Maximum Availability:  *noMAX - Subscription edition now available (US & UK)
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Pat Townsend Secure with New President Circumventing Two Limitations of CPYTOIMPF

    Leave a Reply Cancel reply

Volume 9, Number 28 -- July 21, 2009
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
Maximum Availability
Linoma Software
Tri-Delta Resources

Table of Contents

  • IBM Kills Secure Perspectives Tool
  • Bicycle Seller Rolls with Electronic Vaulting Backup and DR from UCG
  • JDA Shares Plans for E3 Fulfillment Products
  • Quadrant Adds a Slew of Updates to Forms Software
  • Kisco Gives i OS Auditing Tool a Web Makeover
  • CCSS Adds Syslog Support to QMessage Monitor
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization
  • Rimini Street Gets Equity Investment from Adams Street
  • Zobrist Offers Search-Friendly URLs for WebSphere Commerce
  • AIG-Israel Taps Raz-Lee for i OS Security Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • How Committed Is Big Blue To The IBM Cloud?
  • Immutable Copies Are Only As Good As Your Validation
  • Guru: IBM i *USRPRF Security
  • ERP Transitions Loom for SAP on IBM i Customers
  • Inflation Pumps Up Global IT Spending, Supply Chain Deflates It
  • COMMON Set for First Annual Conference in Three Years
  • API Operations Management for Safe, Powerful, and High Performance APIs
  • What’s New in IBM i Services and Networking
  • Four Hundred Monitor, May 18
  • IBM i PTF Guide, Volume 24, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.