• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Boost Your IBM i Security by Tracking Config Changes

    November 18, 2014 Alex Woodie

    One of the most important aspects of IBM i security is having the right configuration. But configurations rarely stay static, and as they change, so does your level of security protection. Kisco Information Systems last week launched a new tool called iSecMap that helps IBM i shops map how configurations change over time and how they might have opened up security problems along the way.

    The IBM i server has a great reputation as a very secure platform on which to run your business. However, the server does not ship from the factory with a strong security turned on by default. Instead, achieving that high level of security requires some careful configuration. Leaving default passwords in place (oopsie!), giving every user *ALLOBJ authority (sorry!), or failing to lock down exit points (my bad!) will make IBM i as vulnerable to external hackers and internal criminals as your worst Windows nightmare.

    Now that you know the secret to good IBM i security, you’re set, right? Unfortunately, setting a good solid configuration is just the starting point. To ensure your security lasts, you have to maintain that strong configuration over time.

    Kisco’s new iSecMap tool can help in that regard. The product “maps” key elements of IBM i security to create a baseline configuration. As the system evolves over time, iSecMap lets users know exactly how those initial configurations changed, and gives them options for responding to those changes.

    iSecMap keeps a close watch on a variety of settings, including security system values, user profiles, group profiles, authorization lists, and library level security. It can also track object security within libraries and object security within Integrated File System (IFS) paths.

    iSecMap will periodically scan the IBM i configuration settings to find out whether they’ve changed. When it detects a change, the product lets users decide if they want to accept the change and make it part of the new baseline, or revert back so that it conforms to the initial configuration setting.

    iSecMap users can set the tool to run on a predefined schedule. The Security Monitor functions runs in the background as a batch job and monitors for changes. The results are sent to the administrator via email or system message. Auditors will also be happy to see that iSecMap maintains a comprehensive listing of the baseline map information stored in the system, which essentially defines the organization’s security policy for the IBM i server. This information can be used for audits, Kisco says.

    The product was prompted by recent experiences Kisco had with two customers, says Kisco CEO Rich Loeber. “In both cases, they had a good security plan in place but were not monitoring it and some changes were implemented that they were not aware of,” he tells IT Jungle.

    IBM i shops that are actively developing their software are perhaps most susceptible to slipping security postures, Loeber says. “I think that if there is any application development going on or new application roll outs going on, then there is an exposure to things getting changed,” he says. “Also, at some locations, when a security problem causes an end user to not be able to get their work done, a ‘patch’ is put in place to allow some work to get done, but then not fixed after the fact. Our product is looking for just such an issue.”

    The insight helped Kisco improve the security of its own development box in Saranac Lake, New York. “We are finding the iSecMap is issuing warnings to us that we have never considered before and we have even changed our work process now to take security into closer account than before,” Loeber says.

    Kisco sells a variety of security tools for the IBM i server, including SafeNet/i, an exit point monitoring tool; iFileAudit, an auditing tool for IBM i; a self-service password reset tool called iResetMe; and ScreenSafer/400, a security-oriented screen saver.

    iSecMap pricing starts at $495 for a single-partition, 100-user license, and tops out at $1,295 for a single-partition unlimited-user license. For more information see www.kisco.com.

    RELATED STORIES

    Kisco Hooks SafeNet Into IBM’s SIEM

    Kisco Gives IBM i Security Tool a Web Interface

    Kisco Locks Down IBM i Security Tool

    Kisco Adds Digital Signatures to Spool-to-PDF Tool

    Kisco Hooks WebReport/400 to Apache for Intranet Serving

    Kisco User Auditing Tool Casts a Wider Net



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Fresche Legacy:  IBM i Management and Modernization Made Easy
    LANSA:  Getting ready to build a mobile app? Webinar: November 19, 11 am CT / 12 pm ET
    Maxava:  Real-time backup and recovery for IBM i on your system or cloud hosted.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ EnterpriseTech: High Performance Computing Industry News From ITJ EIC Timothy Prickett Morgan

    SAP Agrees To Pay Oracle $359 Million To Settle TomorrowNow Suit TMW Adds Dynamic Route Mapping to Trucking Suites

    Leave a Reply Cancel reply

Volume 14, Number 22 -- November 18, 2014
THIS ISSUE SPONSORED BY:

Fresche Legacy
Cilasoft
Shield Advanced Solutions
looksoftware
Focal Point Solutions Group

Table of Contents

  • TMW Adds Dynamic Route Mapping to Trucking Suites
  • TMW Adds Dynamic Route Mapping to Trucking Suites
  • Maxava Gooses IFS Replication Performance for HA
  • Oracle Takes JD Edwards Into the Rental Business
  • SoCal Water District Taps Bytware for Server Monitoring
  • CNX Goes Native with Mobile Framework
  • HiT Hooks HANA to Other Databases with DBMoto
  • Midrange Dynamics Expands IBM i and Multi-Platform App Dev Capabilities
  • ShowCase 10 Gets a Little Help from Friends
  • Boost Your IBM i Security by Tracking Config Changes

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle