• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM i Security Assessment: How About Now?

    June 17, 2014 Alex Woodie

    Ignorance is no longer an excuse. In this day and age, after so many mega-breaches like Target’s and so many warnings, you can no longer honestly claim that you didn’t know your IBM i server was so vulnerable–especially with the availability of free security assessment tools, like the one that PowerTech recently updated.

    PowerTech has probably done more than any other IBM i vendor to pop the bubble that so many organizations live in when it comes to security on the platform. Its annual State of IBM i Security reports regularly showcase the amazing lack of awareness that most professionals have regarding the inherent vulnerabilities that exist in IBM i servers that have not been properly configured. You can read about the rather depressing results of its latest study here.

    And those, of course, are the key words. The IBM i server is eminently, inherently, inexorably securable. It just doesn’t come that way from the factory. Some in the community argue that the IBM i server is the most secure business server in the world. That may or may not be true. But what’s certain is that it takes a bit of work and patience and attention to detail to ensure that the switches and settings are correctly stationed to ensure maximum protection from the various cybercriminals, viruses, script kiddies, terrorists, and rouge nations that are poking at our cyber doors, day and night.

    Security is not a black and white provision; there are many layers of gray. Flip a switch in one place, and it has an effect on other settings. This complex matrix of a security shield is not a one-size-fits-all affair, but something that has to be tailored to specific sites. The grayness of uncertainty extends to other areas, too. Ask a PCI auditor what she thinks about IBM i security, which settings she looks at, and how they affect overall security, and chances are good you’ll get something of a blank look. IBM i is a different beast from your typical Windows and Linux machine, and it’s generally not well understood by auditors, which can benefit you or bite you in the buttocks. It takes a bit of study to understand how all the pieces fit together, and that’s just the way it goes.

    One of the advantages of using a third-party tool to analyze your IBM i security settings is that it cuts through some of the complexity and delivers a more polished report on the state of the box. Jericho Simmons, an IT worker at Capella Healthcare, who pointed PowerTech’s Compliance Assessment product at the company’s IBM i server and was rewarded with easy-to-read results. “This assessment gave me key security components to focus on without having to go through hundreds of reports and spend time filtering through them,” Simmons says.

    Last month PowerTech released Compliance Assessment version 3.0. The big new feature in this release is the addition of a routine to check whether a machine is equipped with antivirus software. Protection from viruses is one of the areas that PCI is focusing on more heavily than in the past, PowerTech says.

    Antivirus protection also happens to be an area where PowerTech has an advantage over other providers of third-party security software on IBM i, since Bytware is one of its sister companies. About 10 years ago, Bytware developed the first antivirus software for OS/400 at the behest of IBM and in conjunction with McAfee. Bytware and PowerTech have since been bought by the company that owns HelpSystems. Other vendors, for instance Raz-Lee Security, have incorporated open source AV tools into their IBM i security offerings. But for enterprises that eschew open source software, Bytware remains the only game in town when it comes to antivirus software that runs natively on the machine.

    Compliance Assessment takes about 10 minutes to provide a snapshot of current system security, the company says. It runs directly from a network-attached PC and doesn’t modify any settings. It focuses on the most important aspects of IBM i security, including user access, public authority, user security, system security, system auditing, and administrative rights.

    The software, which is free, is also the vehicle through which PowerTech collects the security-setting data that it uses in its annual State of IBM i Security report. The data is used completely anonymously; PowerTech will not disclose to anybody how horrible specific customers’ IBM i security configurations are.

    RELATED STORIES

    State Of IBM i Security? Dismal As Usual, PowerTech Says

    The 10-Year Security Itch Needs Scratching

    State Of IBM i Security Remains Poor, PowerTech Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  June 19 Webinar: IBM i to Mobile - Deep Dive
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Sept 30 - Oct 2.
    COMMON:  Join us at the COMMON 2014 Fall Conference & Expo in Indianapolis, Oct 27-29

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ EnterpriseTech: High Performance Computing Industry News From ITJ EIC Timothy Prickett Morgan

    Modernization Train Makes A Run Through Europe Here’s More Help For A Huge Hardship

    Leave a Reply Cancel reply

Volume 14, Number 13 -- June 17, 2014
THIS ISSUE SPONSORED BY:

Fresche Legacy
looksoftware
HiT Software
Computer Keyes
RJS Software Systems

Table of Contents

  • IBM’s New HyperSwap a Head Scratcher for Some
  • Quadrant and BCD Re-Align Partner Programs
  • Oracle Brings Big In-Memory Speedup to JD Edwards Apps
  • MSP SIaS Waves a Magic Xand
  • Managing IBM i by Exception: Entering a World of Help
  • Formtastic Learns New Barcode Tricks
  • CloudFax/400 Licenses Free Through End of Month
  • Linoma Gets a Handle on Complex Workflows with MFT
  • IBM i Security Assessment: How About Now?
  • What HANA on Power Means to IBM i

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle