• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • WebLayers Watches for Poorly Configured WebSphere MQ

    February 16, 2010 Alex Woodie

    WebLayers, a developer of software that helps to automate customers’ governance initiatives–particularly as it relates to IBM middleware–this month unveiled new IT governance software aimed at ensuring customers’ WebSphere MQ deployments are conducted in accordance with guidelines and best practices.

    Cambridge, Massachusetts-based WebLayers develops an array of products designed to align the business-level governance mandates with a company’s actual IT resources and development activities. The company, which packages and sells this expertise through its WebLayers software, boasts of having the largest collection of “governance policies in the industry. When it comes to WebSphere MQ, WebLayers offers more than 90 governance policies, the company says.

    WebLayer’s new governors work by scanning the WebSphere MQ queues to determine whether they are in compliance with industry mandates and best practices. In particular, the software analyzes the way WebSphere MQ was set up, and whether it is vulnerable to security breaches or could accidentally transmit bad information.

    Poorly configured security on WebSphere MQ, which ships basically with zero security turned on, is more common than one would think for such a critical and widely used IT infrastructure component.

    While WebLayers does not run on the i/OS operating system, it does support WebSphere MQ running on this platform, according to Ron Karas, director of technical services for WebLayers. “Our software uses standard client APIs to interrogate remote channels, queues, and queue managers to evaluate policy adherence,” Karas says vie e-mail.

    In fact, WebLayers can help to mitigate potential configuration problems that arise when running WebSphere MQ on disparate platforms such as i/OS, Karas adds. For more information, visit the company’s Web site at www.weblayers.com.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    MaxAva:  Get a complimentary continuity assessment for *noMAX - Premium HA & DR
    ProData Computer Services:  Save the day with RDR and ProData utilities!
    COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Big Executive Shakeup and Shakeout at SAP Handling Constraint Violations in RPG

    Leave a Reply Cancel reply

Volume 10, Number 7 -- February 16, 2010
THIS ISSUE SPONSORED BY:

Bytware StandGuard Security
LANSA
MaxAva
DRV Technologies
Twin Data

Table of Contents

  • i/OS Shops to Wait Another Quarter for Power7 Compilers
  • Technology Mashup Yields an iPhone App for BPCS Data
  • SharePoint Gets Its Own iBOLT for ERP Integration
  • Datawatch Adds Goodies to Data Warehousing Software
  • ACOM Streamlines Access to Content in EZCM and SharePoint
  • WebLayers Watches for Poorly Configured WebSphere MQ
  • Mulesoft Debuts ‘Cloudcat,’ or Tomcat in the Cloud
  • Stonebranch Taps Cleo for B2B Expertise
  • SunGard Makes the Case for Outsourced DR
  • InfoPrint Reaches Out to Resellers

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle