• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech Blocks IBM i Commands with New Tool

    July 26, 2011 Alex Woodie

    IBM i administrators can prevent users from executing certain commands with the new Command Security tool unveiled by PowerTech this month. Command Security features a rule-based control mechanism that can block commands for certain users and circumstances, or even modify the command before execution. It also features an audit trail that ensures attempts to use specific commands won’t go unnoticed.

    While the text-based command line is viewed by Windows and Web aficionados as a vestigial backwater overlooked by computer evolution, devotees of the IBM i server understand how powerful and useful the command line can be. Instead of fooling around with a mouse and multiple graphical menus crowding the screen, the clean, green interface of a 5250 session gives the experienced operator incredible freedom to execute an untold number of complex system tasks with a few quick strikes of the keyboard.

    Unfortunately, great power requires great responsibility. In the right hands, the command line can provide an operator with a speed advantage over his GUI-loving colleagues. But it can also magnify the inexperience of a careless operator, and lead to harm of the system and application environment. This is why most regular employees are not given access to command lines.

    For example, accidentally typing PWRDWNSYS into the command line and pressing enter will cause the Power Systems server to, well, power down. The CHGSYSVAL command can similarly lead to unintended consequences. These are the types of commands that users may wish to block first using Command Security, says PowerTech director of security technologies Robin Tatum.

    Command Security provides several levels of protection against potentially harmful commands. Administrators can choose to simply monitor and be notified of the usage of commands by one or more operators, authorized users, or even third-party applications. It can also be used to completely block the execution of certain IBM system or third-party application commands.

    Command Security can also be configured to allow commands to be executed in certain circumstances (maybe allowing PWRDWNSYS to be used after the end of the work day). It can even modify the parameters of certain commands before they are executed, which could be handy for meeting company requirements. And it keeps a history of all command usage in a secure journal, which can be important for reporting and regulatory compliance purposes.

    “Not all commands have the potential for misuse,” Tatam says in a press release. “Command Security gives users the flexibility to control just the commands and situations that could compromise system data or security. Plus, it works with almost any IBM i command and can control commands in third-party applications.”

    The new offering becomes the sixth offering in PowerTech’s product suite, and the second new product added this year. Last month, the company’s corporate parent, Help/Systems, bought PowerTech an early Christmas present: the powerful database change monitoring tool DataThread, from Innovatum. Other products include Network Security, which protects exit points; Compliance Monitor, which provides security auditing and reporting; Authority Broker, which controls the use of powerful IBM i user profiles; and Interact, which communicates real-time IBM i security events to third-party security information and event management (SIEM) products.

    Command Security works with i5/OS V5R4 and IBM i 6.1 and 7.1. Pricing was not disclosed. For more information see www.powertech.com.

    RELATED STORIES

    Help/Systems Buys Database Monitoring Tool from Innovatum

    PowerTech’s IBM i Security Conference Slated for September

    PowerTech: IBM i Security Still Needs Work

    PowerTech Delivers Object-Based Control Over Exit Points

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Acquired by Help/Systems, Private Equity Firm

    PowerTech Updates Compliance Manager

    PowerTech Tools Build Trust By Decreasing Authority

    PowerTech Unveils New Password Utility



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  Integrate RPG applications and deploy to the iPad. Download the case study
    CNX:  Ready to develop true Web 2.0 applications? Valence Version 3.0 BETA 3 is now available
    System i Developer:  Join the Gurus at the RPG & DB2 Summit in St. Louis, October 17-19

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Big Blue Doesn’t Compete Against i Cloud Backup Vendors REPLACE to Replace Characters in a String

    Leave a Reply Cancel reply

Volume 11, Number 24 -- July 26, 2011
THIS ISSUE SPONSORED BY:

Maxava
Help/Systems
BCD
Profound Logic Software
inFORM Decisions

Table of Contents

  • Oracle’s Environmental Accounting App Finds Gold in Going Green
  • PowerTech Blocks IBM i Commands with New Tool
  • Linoma Breaks Crypto Tool into Two
  • inFORM Decisions Adds Conditioning to Data Mapping Tool
  • HiT Ships Updated DB2/400 for .NET Data Provider
  • RJS to Provide Single Sign-On
  • Thoma Bravo Sells Flexera to Canadian Teachers
  • Flux Hooks Up with MFT Consultancy
  • IntelliChief Touts Install at Bergquist
  • TMW Nabs Appian for Truck Routing

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26
  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle