• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • CCSS Targets Security Issues in ‘Best Practices’ Guide

    January 18, 2011 Alex Woodie

    Systems management software firm CCSS has written a new best practices guide aimed at enlightening administrators about the ramifications of security breaches in the IBM i OS. The four-page paper encourages admins to think not only about the data lost to cyber criminals eager to hack their systems, but also about unintended security breaches hurting system availability.

    One doesn’t usually think of CCSS as a security software company. After all, the U.K. firm’s main field of expertise is systems management and monitoring of IBM i servers, not exit points or users with ALLOBJ authority. Keeping the server running efficiently with the least amount of effort is the bailiwick for CCSS, which only recently started delving deeper into IBM i security issues, such as with its support for security audit journals in its QMessage Monitor (QMM) offering.

    But with its new paper, titled “The Ghost in the Machine,” CCSS draws a convincing line connecting good systems management with solid security practices. In many situations, the first line of defense following a security breach is a monitoring tool that can detect the problem.

    For example, CCSS cites one case of an American logistics company that experienced a security breach. The company, which didn’t know its system was compromised, was forced to spend lots of money to activate additional capacity on its System i server when it was unable to detect the cause of a runaway job. Better systems management and monitoring could have kept the customer more informed on the state of the system, saving it money.

    It comes down to covering “hot spots” of risk in a System i environment, says CCSS product manager Paul Ratchford.

    “When we talk about security issues, it’s not just a malicious threat from the outside,” he says. “It also includes situations that breach internal protocols that are not driven by any sort of sinister motivation and also, the circumstances that can leave the system vulnerable to attack, whether one occurs or not. The guide aims to assess these common areas of risk exposure and offers solutions to eliminate them.

    To download the new best practices guide, go to www.ccssltd.com/resources/best-practice.php.

    RELATED STORIES

    CCSS Digs Deeper Into the Audit Journal to Yield Clues

    CCSS Goes ’12 for 12′ with IBM i Monitoring Solution

    CCSS Offers Flexible Pricing for Service Providers

    CCSS Keeps an Eye on State of Backups with New BRMS Monitors

    CCSS Cracks Down on Long-Running Jobs

    CCSS Enhances System i Disk Monitoring with Utility

    Siemens Taps CCSS to Monitor Outsourced i OS Environment



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Two Steps Forward, No Steps Back

    For over 35 years, Rocket Software’s solutions have empowered businesses to modernize their infrastructure, unlock data value, and drive transformation – all while ensuring modernization without disruption.

    LEARN MORE

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SEQUEL Software:  FREE Webinar. Learn how ABSTRACT can smooth software development. Jan. 19
    Townsend Security:  FREE Podcast! Key management best practices: What new PCI regulations say
    System i Developer:  Upgrade your skills at RPG & DB2 Summit in Orlando, March 22-24

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Rising Spending Tide Finally Raises the SAP Boat A Reusable Routine for Doubly-Linked Lists, Part 1

    Leave a Reply Cancel reply

Volume 11, Number 2 -- January 18, 2011
THIS ISSUE SPONSORED BY:

looksoftware
ProData Computer Services
Linoma Software
ManageEngine
WorksRight Software

Table of Contents

  • IBM i Solution Edition Program Picks Up Steam
  • Symtrax Updates StarQuery for JDE, Asian Markets
  • BCD Updates Web Development Tools
  • ASNA’s Newest RPG to .NET Option Now Available
  • Jaspersoft Pushes BI to the Web with Version 4
  • Kofax Sells Hardware Business, Enhances Software
  • IBS Hires Former Intentia Executive as Permanent CEO
  • CCSS Targets Security Issues in ‘Best Practices’ Guide
  • LogLogic Updates Security Event Manager
  • GoFaster Touts Growth in China

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle