• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • CCSS Targets Security Issues in ‘Best Practices’ Guide

    January 18, 2011 Alex Woodie

    Systems management software firm CCSS has written a new best practices guide aimed at enlightening administrators about the ramifications of security breaches in the IBM i OS. The four-page paper encourages admins to think not only about the data lost to cyber criminals eager to hack their systems, but also about unintended security breaches hurting system availability.

    One doesn’t usually think of CCSS as a security software company. After all, the U.K. firm’s main field of expertise is systems management and monitoring of IBM i servers, not exit points or users with ALLOBJ authority. Keeping the server running efficiently with the least amount of effort is the bailiwick for CCSS, which only recently started delving deeper into IBM i security issues, such as with its support for security audit journals in its QMessage Monitor (QMM) offering.

    But with its new paper, titled “The Ghost in the Machine,” CCSS draws a convincing line connecting good systems management with solid security practices. In many situations, the first line of defense following a security breach is a monitoring tool that can detect the problem.

    For example, CCSS cites one case of an American logistics company that experienced a security breach. The company, which didn’t know its system was compromised, was forced to spend lots of money to activate additional capacity on its System i server when it was unable to detect the cause of a runaway job. Better systems management and monitoring could have kept the customer more informed on the state of the system, saving it money.

    It comes down to covering “hot spots” of risk in a System i environment, says CCSS product manager Paul Ratchford.

    “When we talk about security issues, it’s not just a malicious threat from the outside,” he says. “It also includes situations that breach internal protocols that are not driven by any sort of sinister motivation and also, the circumstances that can leave the system vulnerable to attack, whether one occurs or not. The guide aims to assess these common areas of risk exposure and offers solutions to eliminate them.

    To download the new best practices guide, go to www.ccssltd.com/resources/best-practice.php.

    RELATED STORIES

    CCSS Digs Deeper Into the Audit Journal to Yield Clues

    CCSS Goes ’12 for 12′ with IBM i Monitoring Solution

    CCSS Offers Flexible Pricing for Service Providers

    CCSS Keeps an Eye on State of Backups with New BRMS Monitors

    CCSS Cracks Down on Long-Running Jobs

    CCSS Enhances System i Disk Monitoring with Utility

    Siemens Taps CCSS to Monitor Outsourced i OS Environment



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SEQUEL Software:  FREE Webinar. Learn how ABSTRACT can smooth software development. Jan. 19
    Townsend Security:  FREE Podcast! Key management best practices: What new PCI regulations say
    System i Developer:  Upgrade your skills at RPG & DB2 Summit in Orlando, March 22-24

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    IBS Hires Former Intentia Executive as Permanent CEO LogLogic Updates Security Event Manager

    Leave a Reply Cancel reply

Volume 11, Number 2 -- January 18, 2011
THIS ISSUE SPONSORED BY:

looksoftware
ProData Computer Services
Linoma Software
ManageEngine
WorksRight Software

Table of Contents

  • IBM i Solution Edition Program Picks Up Steam
  • Symtrax Updates StarQuery for JDE, Asian Markets
  • BCD Updates Web Development Tools
  • ASNA’s Newest RPG to .NET Option Now Available
  • Jaspersoft Pushes BI to the Web with Version 4
  • Kofax Sells Hardware Business, Enhances Software
  • IBS Hires Former Intentia Executive as Permanent CEO
  • CCSS Targets Security Issues in ‘Best Practices’ Guide
  • LogLogic Updates Security Event Manager
  • GoFaster Touts Growth in China

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Big Easy: Connecting The Dots On Big Blue’s AI Strategy For IBM i
  • From Migration To Maturity: The Cloud Reality For IBM i Shops
  • COMMON Dances To A Fresh New Tune In New Orleans
  • Eradani Touts Native Git Connection As AI Tools Spread
  • IBM i PTF Guide, Volume 28, Number 17
  • Power Systems Still Waiting For The GenAI Bump
  • The IBM i and the Hybrid Cloud World: Things To Keep In Mind
  • CData Adds Db2 for i Support to CDC Tool
  • As I See It: The Cost of Having Ethics
  • Brace Yourself: Another Power Systems Price Hike Coming May 1

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle