• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Kisco Rolls with 2FA, Revs Network Security Tool

    May 20, 2015 Alex Woodie

    Data security isn’t just nice to have–it’s the law in most industries. One of the best ways to keep unauthorized users from snooping where their snouts don’t belong is two-factor authentication (2FA), which requires users to have two pieces of identifying credentials before being granted entry. A new 2FA solution for IBM i was launched recently by Kisco Information Systems, which also updated its exit point monitoring program for IBM i.

    Kisco’s 2FA solution, called i2Pass, puts a roadblock in front of attempts to access IBM i assets. If the users have the correct credentials–which is the combination of their user names and passwords, as well as a secret passcodes sent to enrolled email addresses–then they are granted access. If they don’t have those two pieces of authenticating materiel, then they are duly dispatched through a trap door in the floor. (Just kidding.)

    Out of the box, i2Pass features a standard green-screen interface, which most customers will be familiar with. Alternatively, customers can take an API that Kisco provides for i2Pass and embed the 2FA process into their own custom applications.

    When presented the 5250 sign-on screen, the user is asked to enter the secret nine-digit pass code that has been generated by i2Pass (which also runs on the IBM i server) and sent to their email; alternatively, a user may have the passcode sent as a text message, provided that his or her carrier supports email-to-text capabilities.

    Once they retrieves the passcode from a smartphone, a laptop, or even an Apple Watch (which functions as the second device in the 2FA scheme), they enters the secret pass code into the i2Pass interface, and are granted access.

    Once a passcode is used, it’s subsequently destroyed, never to be seen again. Kisco can also pre-generate a list of 2FA codes that can be used at a later time. This would be useful for situations when the user does not have access to an Internet connection or access to instant email.

    Kisco president Rich Loeber says there is growing pressure to adopt security solutions like 2FA. “I think that the two-factor authentication requirement in PCI rules is providing the most push to implement this,” he tells IT Jungle, adding that auditors are pushing for solutions like this.

    While i2Pass isn’t the first 2FA product in the IBM i marketplace, its 5250 interface should help it stand out from the GUI pack, Loeber says. “i2Pass provides a built-in 5250 two-factor authentication process and I don’t see that in a lot of the other offerings based on vendor website information,” he says.

    Kisco also launched a new release of SafeNet/i, its network security tool for IBM i. With release 10.25, the company has added new context-sensitive source IP address controls, which gives administrators more granular control over the functions that IBM i users can access. For example, a user profile might be granted access to the system for FTP, but denied access for ODBC from a given source IP address or address range.

    Telnet security has also been enhanced with this release. In the past, users may have been inclined to fire up an unencrypted Telnet session to do some quick work. But that would be impossible with the latest release of SafeNet/i, which can be set up to require a Telnet session be encrypted with SSL.

    Last but not least is a new type of SafeNet/i account. By setting up a “read only” administrator account, an IBM i shop can provide a place for auditors to review security settings in SafeNet/i while preventing any changes (accidental or intentional) from being made.

    Pricing for 2FA starts at $495 for a single server license with 25 users. Kisco sells user licenses in 25-user bundles, and for $1,295, customers can get a license for an unlimited number of users. The software supports i5/OS V5R4 through IBM i 7.2. SafeNet/i, meanwhile, costs $2,195 for a 20-user license. For more info see www.kisco.com.

    RELATED STORIES

    State of IBM i Security? Still Horrible, After All These Years

    Security Breaches Reminder For IBM i Shops To Up Their Games

    Townsend Looks to Spread 2FA Far and Wide

    m-Power Brings 2FA to Web Apps

    Arpeggio Goes for the ‘Hacker Shutdown’ with 2FA Offering for IBM i

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    The Omni User:  Chicago's OMNI Technical Conference, June 4-5, Palos Hills, Illinois
    LaserVault:  FREE Webinar - IBM i: Understanding Tapeless Backups. May 27
    United Computer Group:  VAULT400 BaaS delivers secure cloud backup and DR solutions

    Job User Name And Current Job User Power8 Iron Gets New I/O Options

    Leave a Reply Cancel reply

Volume 25, Number 28 -- May 20, 2015
THIS ISSUE SPONSORED BY:

Maxava
ARCAD Software
LaserVault
Remain Software
Manta Technologies

Table of Contents

  • Hadoop and IBM i: Not As Far Apart As One Might Think
  • Shield Goes Lean and Mean with HA Software
  • ARCAD Release Management Fits With UrbanCode DevOps
  • Kisco Rolls with 2FA, Revs Network Security Tool
  • BCD Tweaks Web Dev Tools. . . Focal Point Updates DR FlashCopy. . . Boadway Puts IBM i Performance Data on the Cloud. . .

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle