• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Why You Might Want To Encrypt Your Syslogs Now

    June 19, 2015 Alex Woodie

    Every day millions of IBM i server events are packaged up in the syslog standard and sent offsite for safekeeping and analysis. In many cases, the syslog files are sent in plain text across the wire because, hey, they’re just boring old log files, and what could anybody ever do with those, right? Wrong, says IBM i security software company Raz-Lee Security.

    Syslogs are a bread-and-butter data format for IT professionals around the world. Just about every device in the data center uses the syslog format to transmit data about what it’s done. All sorts of IT activities are documented in syslog, from debugging applications and general systems management to real-time network alerts and security auditing.

    In the security space, syslogs are the de-facto standard for sending system events to the all-important security information and event management (SIEM) products that do the hard work of analyzing and correlating activity occurring across different servers, networks, databases, switches, and various other systems. No platform is an island these days–not even the venerable IBM i server–and SIEM products like IBM‘s QRadar, Hewlett-Packard‘s ArcSight, LogRhythm‘s Security Intelligence, RSA Security‘s enVision, and Splunk‘s Enterprise Security are critical assets in the ongoing war against cyber criminals.

    Security software companies plying the IBM i waters are no stranger to these SIEM products, and most of them are equipped to convert IBM i events–such as QAUDJRN system journal events, message queues, and user-related information–from the native IBM i format into syslog and send them across the wire to a central SIEM server.

    Eli Spitz, Raz-Lee’s vice president of business development, says the company decided to use TLS to encrypt syslog files at the request of customers.

    “We’ve been asked by a number of customers, not a large number but some very large and important customers,” to encrypt the syslogs, Spitz tells IT Jungle in an interview. “One of the customers is a pharmaceutical company based in Eastern Europe. They said ‘We have to have encryption in syslog to be compliant with FDA regulations.’ That was after we received a number of requests.”

    Helping customers comply with Food and Drug Administration regulations–in this case, rules that require tamper-proof lot tracking at pharmaceutical manufacturers–is certainly a good enough reason. But would companies in other industries have a reason to encrypt their syslogs?

    Yes, says Raz-Lee CTO Schmuel Zailer. While you’re not going to find personally identifiable information (PII) in the server logs, there are other pieces of data contained in the log files sent from production IBM i servers to SIEM and servers that could be of value to cybercriminals.

    “The SIEM server collects information that’s coming from the IBM i, which means your line is exposed and everybody can understand what is going on on the IBM i if you just listen to that line,” Zailer says. “So you must encrypt it. And if you encrypt it, you hide it.”

    Raz-Lee’s iSecurity suite not only sends data from QAUDJRN and other message queues; it can also upload data from the database journal, Zailer says. This is dubbed database activity monitoring (DAM), a relatively new discipline in the IBM i community, and one in which Raz-Lee has a partnership with McAfee.

    For customers who choose to replicate contents of the database journal to a SIEM server via syslog–such as one large insurance company that sends thousands of database events per second–that poses an unacceptable security risk. “We send over the net information of the database updates [which] means that the database is exposed,” Zailer says.

    Encryption is a major theme for Raz-Lee this year. The Israeli company is gearing up to offer PGP encryption in iSecurity. It’s also planning to beef up its field-level encryption offering with a major update later this year. “Encryption is emerging to be a major theme,” Spitz says.

    RELATED STORIES

    State of IBM i Security? Still Horrible, After All These Years

    Security Breaches Reminder For IBM i Shops To Up Their Games

    New Approaches Needed For Hyperscale Security Threats

    Raz-Lee Certifies IBM i Security Tools with McAfee

    Raz-Lee Supports IPv6 with IBM i Security Software

    Raz-Lee Delivers New IFS Object Security for IBM i

    McAfee Works with Raz-Lee to Monitor DB2 for i

    Raz-Lee Updates AP-Journal Fraud-Detection Tool

    Raz-Lee Feeds IBM i Data into RSA SIEM

    Editor’s Note: This article was corrected. Raz-Lee is not the first vendor to encrypt syslog files. IT Jungle regrets the error.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    With MDRapid, you can drastically reduce application downtime from hours to minutes. Deploying database changes quickly, even for multi-million and multi-billion record files, MDRapid is easy to integrate into day-to-day operations, allowing change and innovation to be continuous while reducing major business risks.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    HiT Software:  Make your data pay off quickly and easily, regardless of location with DBMoto.
    SystemObjects:  Send SMS, email & push messages from your IBM i applications!
    LaserVault:  FREE WEBINAR: IBM i Backups: An Easier World Without Tape. June 23

    Surround Tech Goes Up The Stack The AS/400 Turns 27, And Still Has Much To Teach IT

    Leave a Reply Cancel reply

Volume 25, Number 32 -- June 17, 2015
THIS ISSUE SPONSORED BY:

Profound Logic Software
LaserVault
System i Developer
Computer Keyes
Manta Technologies

Table of Contents

  • Why You Might Want To Encrypt Your Syslogs Now
  • dbFunnel Provides Native ETL For IBM i
  • LaserVault Moves IBM i Backups Forward
  • Mad Dog 21/21: Big Apple
  • Surround Tech Goes Up The Stack

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle