• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says

    September 16, 2013 Alex Woodie

    It’s time for system administrators to give up security-related tasks and hand them over to a dedicated security administrators in IBM i shops, says Skyview Partners. While the jack-of-all trades approach has succeeded in keeping costs down, the risks of losing data are becoming too great to rely on the skills of a generalist, says the company, which just published a new guide describing the role of an IBM i security administrator.

    “Security administration can no longer be lost in the list of things that a system administrator is supposed to do on a regular basis,” says Skyview president Carol Woodbury, a renown IT security expert and former security architect at IBM for the AS/400 (now IBM i) server.

    “IBM i administrators do a bit of this and a bit of that,” she continues. “Unfortunately, for whatever reason, security administration is one of those tasks that quite often falls off the list. The effect is that the risk to the system and data is increasing because security administration–from our experience–is not being performed.”

    Woodbury’s colleague, Skyview CEO John Vanderwall, agrees. “While systems administration is a well-founded discipline and it’s easy to define what a systems administrator is supposed to do, that is not the case for a ‘security administrator,'” he says. “Often times security administration is a just another task on the ‘to do’ list of the systems administrator. What we’ve discovered is the security administration is pretty far down on the list, mostly because system admins aren’t quite sure of what they should be paying attention to. Sure they know some basics, but in reality it’s the details that count. The old adage that the ‘devil is in the details’ seems to apply here.”

    Woodbury’s and Vanderwall’s observations are backed up by years of security studies performed by PowerTech, where Woodbury also used to work. Year after year, PowerTech publishes annual State of Security reports that demonstrate the dismal state of security on the IBM i platform. In most cases, the problems come down to using incorrect configurations. In many cases, IBM i shops never change the default settings, opening up rather large gaps in security on production systems.

    SkyView hopes to address that problem with its new e-book, called the IBM i Security Administrators Guide. “Some people administering the system have been trained to run the system but not attend to security,” Woodbury continues. “So we’re trying to raise the awareness that security administration needs to occur. In light of the fact that not everyone is trained, or it’s not something they do every day… we’ve provided this e-book to explain what should be accomplished by the person whose job it is to perform security administration.”

    Skyview took it upon itself to describe the security administrator’s role and the specific tasks that need to be performed on the IBM i server. “This book is a quick read intended to get to the heart of the matter, giving very specific guidance and help to companies so that security is properly addressed on the platform,” Woodbury says.

    Introducing the security administrator role to an organization doesn’t necessarily mean it needs to hire a new employee to take that role. It can be performed by an existing member of the IT staff, or even by an outside consultant. (SkyView provides such services, by the way.) The important thing is that more emphasis needs to be placed on the job of the security administrator. That means more time is allotted to it and (yes) more money is spent ensuring that the job is getting done.

    It will be a tough sell. IBM i organizations are notoriously tight with the purse strings, and the Great Recession has only solidified their approach to getting much more out of their IT staffs than with Windows and Unix servers. However, the writing is on the wall. Just as it’s becoming clear that IBM i shops may be best served by hiring dedicated database administrators (DBAs) to oversee the handling of data, it’s also become clear that security isn’t something to mess around with.

    SkyView has seen its share of security horrors at its customer shops, which it will never discuss publicly (despite the best efforts of nosey reporters). However, the company will share general observations about what it’s seen through its Security Check-up security assessment services.

    “In some cases, we have discussed vulnerabilities that we discovered and then the next year, we discuss the same vulnerabilities,” Woodbury says. “Things like profiles with never-changing passwords, inactive profiles that remain available for use, IFS directories that need to be secured, etc. They know they need to address the issues–they have intentions to do it each year–but it never gets done.”

    It’s time to get them done.

    To download the IBM i Security Administrators Guide, go to Skyview’s website at www.skyviewpartners.com.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    SkyView Launches Security Compliance Reporting Service

    SkyView Launches New Auditing Tool

    SkyView Gets Tough on User Profiles

    SkyView Taps New CEO to Ride the Compliance Wave

    SkyView Adds PCI Checks to Risk Assessment Tool

    SkyView Goes GUI with i OS Security Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Six Tips For Managing IBM i Spooled File Storage PSGi Offers Help for Neglected IBM i Servers

    Leave a Reply Cancel reply

Volume 23, Number 31 -- September 16, 2013
THIS ISSUE SPONSORED BY:

BCD
Infinite Corporation
Abacus Solutions
Computer Keyes
WorksRight Software

Table of Contents

  • Slices Of i For The Little Guys
  • It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says
  • IBM Aims NextScale Hyperscale Boxes At Clouds–And Possibly Power8
  • Mad Dog 21/21: For Blue It’s Difficult, For Meme It’s Easy
  • Key CIO Confab Uncovers Concerns
  • Stalled Budgets Stand In The Way Of IT Hiring
  • Intel’s New Xeon E5s Push Back Against Power7+ Processors
  • Help/Systems Takes Power7 Trends And Tech Tour On The Road
  • Some Tweaks On Deals And Flex System Price Changes
  • IBM Sells Off BPO Services Biz To Synnex For $505 Million

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The IBM i Power10 Upgrade Cycle Forecast Looks Favorable
  • White Hats Completely Dismantle Menu-Based Security
  • Cloud Software To Drive Enterprise Application Growth
  • How Do You Stay In Touch With The IBM i Community?
  • IBM i PTF Guide, Volume 25, Number 6
  • Security Still Top Concern, IBM i Marketplace Study Says
  • Bob Langieri Shares IBM i Career Trends Outlook for 2023
  • Kisco Brings Native SMS Messaging to IBM i
  • Four Hundred Monitor, February 1
  • 2023 IBM i Predictions, Part 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.