• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM Kills Secure Perspectives Tool

    July 21, 2009 Alex Woodie

    IBM last week announced the withdrawal from marketing and discontinuance of support for Secure Perspectives, an i OS security tool introduced two years ago with the goal of allowing nontechnical people to define and implement an object-level security policy using nontechnical words and phrases. However, the product will continue to be available as a custom offering, as will updates that allow it to work with future releases of IBM i OS.

    Unveiled in April 2007 and shipped a month later, IBM introduced Secure Perspectives as a way to get more i5/OS shops to implement object-level security on their System i servers.

    Object-level security is one of the most powerful elements of security on this platform, as it explicitly controls which objects a user has access to and which objects they don’t. Even without other security precautions in place, such as exit point monitoring, if an organization has object-level security implemented, the chances of a major security breach are greatly minimized. (You can chalk up this feature to the AS/400’s amazing object-oriented architecture, which has been keeping AS/400 shops malware-free and [mostly] virus-free for decades, while Windows and Unix architecture, which lack this object-oriented nature, suffer the consequences of their file system attributes.)

    While object-level security is powerful, it can also be quite complex. Implementing object-level security can be a real challenge, and requires a good deal of technical expertise. IBM hoped to change that with Secure Perspectives, which sought to convert i5/OS-specific technical jargon into “natural language” terms. But judging from last week’s withdrawal from marketing and support, uptake of the product was not as high as IBM had initially hoped.

    Those who adopted Secure Perspectives are not left totally in the lurch. IBM will be phasing out the product over the course of the next couple of years. Effective October 19, customers will no longer be able to buy the Secure Perspectives version 1.2 tool, or a 12-month support package. Over the next two years, various support programs will be wound down. The final date listed is September 30, 2011, when the per-day licensing option for Secure Perspectives is withdrawn.

    In its announcement, IBM says the product “will continue to be available as a custom offering delivered by the IBM Systems Lab Services and Training Power Services team.” It goes on to say that “support and enhancements for this tool on future releases of IBM i will be offered as part of this Security Services offering.”

    In other words, if you pony up for IBM’s “custom offering,” you can continue to receive updates enabling you to use Secure Perspectives with i 6.2 and future releases. This will undoubtedly be more expensive than the $900 per-processor annual maintenance fee that IBM was initially charging (on top of the $1,500 per processor license fee). But if the product proved useful in these customer settings, it could be worth it to buy IBM’s custom offering.

    Customers may also be able to license Secure Perspectives from third-party resellers. For more information, see United States Withdrawal Announcement 900-155 at IBM’s Web site.

    RELATED STORIES

    IBM Ships Secure Perspective for System i

    IBM Addresses Object-Level Security with New Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Webinar] Power of Automation: Integration Brings Transparency

    Thursday, October 26 at 12 PM ET / 9 AM PT

    See the ‘magic’ of Automation in a DevOps pipeline and ‘real’ integration with ARCAD’s open tooling.  If you’re wondering where to start, look at what your company is using now.

    Attend this Webinar to see:

    • Examples of rich integration for easy access to pipeline information, instant and improved feedback.
    • The industry’s only automatic Build engine for the IBM i.
    • The high level of visibility behind the scenes.
    • What current Customers are doing with Azure, Jira, Jenkins and more with our flexible options.

    Register Now for our webinar – Power of Automation: Integration Brings Transparency – on Thursday October 26 at 12 PM ET / 9 AM PT

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Tune in to Profound Logic TV for FREE educational videos and tips
    Maximum Availability:  *noMAX - Subscription edition now available (US & UK)
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Pat Townsend Secure with New President Circumventing Two Limitations of CPYTOIMPF

    Leave a Reply Cancel reply

Volume 9, Number 28 -- July 21, 2009
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
Maximum Availability
Linoma Software
Tri-Delta Resources

Table of Contents

  • IBM Kills Secure Perspectives Tool
  • Bicycle Seller Rolls with Electronic Vaulting Backup and DR from UCG
  • JDA Shares Plans for E3 Fulfillment Products
  • Quadrant Adds a Slew of Updates to Forms Software
  • Kisco Gives i OS Auditing Tool a Web Makeover
  • CCSS Adds Syslog Support to QMessage Monitor
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization
  • Rimini Street Gets Equity Investment from Adams Street
  • Zobrist Offers Search-Friendly URLs for WebSphere Commerce
  • AIG-Israel Taps Raz-Lee for i OS Security Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • 40 Years Of DB2, But Even More For That No-Name Database Embedded In The System/38
  • API Dev Tool Delivers For Trucking Outfit
  • Guru: TryIT – You’ll Like It
  • It’s Time To Tell Us How It Is And What You’re Doing
  • IBM i PTF Guide, Volume 25, Number 40
  • Shield Builds on Success with Nagios for IBM i
  • Why You Should Be Concerned About the MGM ‘Vishing’ Attack
  • IBM Bolsters Database Security with Guardium 12.0
  • Four Hundred Monitor, September 27
  • The IBM i Marketplace Survey Needs Your Input

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle