• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Syncsort Unveils MFA, Bolsters IBM i Security Suites

    July 30, 2018 Alex Woodie

    Syncsort last week unveiled new security and auditing capabilities for its IBM i user base, including a new multi-factor authentication (MFA) solution dubbed the Cilasoft Reinforced Authentication Manager for IBM i, as well as new releases of the Cilasoft and Enforcive security suites.

    Developing and selling security software has become one of the focuses for Syncsort, the Pearl River, New York, company that previously concentrated on developing mainframe data integration solutions and extract, transfer, and load (ETL) technology for distributed Hadoop clusters.

    Since it merged with IBM i high availability vendor Vision Solutions last year, Syncsort has acquired several IBM i security vendors, including Cilasoft, Enforcive, and Townsend Security, and company executives say more are deals possibly on the way.

    As part of the rebranding initiative that started earlier this year, Syncsort has grouped its HA/disaster recovery and security products under the Assure line of products (the other brands are Optimize, Integrate, and Advance). The thinking behind that grouping, Syncsort has explained to IT Jungle, is that both security and HA/DR solutions are similar in that they’re intended to protect businesses from disruption. And at least on IBM i, they both rely in part on the same journaling technology, they said.

    In terms of product news, Syncsort announced that it is shipping new releases of two security products, including the Cilasoft Compliance and Security Suite for IBM i, and the Enforcive Enterprise Security Suite. It also announced a net-new addition to the security team, the Cilasoft Reinforced Authentication Manager for IBM i, which goes by RAMi for short.

    Both the Cilasoft and Enforcive security suites offer similar capabilities in terms of detecting potential security gaps in the security IBM i server (which are commonly misconfigured security settings in the IBM i operating system) and suggesting ways to remediate or fill them. However, there are important distinctions between the products.

    The Enforcive security suite focuses on examining common IBM i administrative topics like use of powerful user profiles, default passwords, library authorities, exit programs, and system values. The Cilasoft security tools, on the other hand, excel in tracking changes to the operating system and the integrated Db2 for i database through its powerful journal-tracking software, dubbed QJRN/400 as well as applying data-centric security rules through its CONTROLER product.

    Syncsort said that it’s delivering new releases of the Enforcive and Cilasoft suites to bolster data protection and to help customers comply with the new regulatory landscape. A big part of that job is helping IBM i shops navigate and achieve compliance with the European Union’s General Data Protection Regulation (GDPR), which went into effect on May 25.

    The company also delivered RAMi, a new Cilasoft product that’s designed to streamline a host of authentication and password-related challenges, including the delivery of multi-factor authentication (MFA) functions that are increasingly being required as a way to protect against unauthorized access to sensitive programs and data.

    According to Syncsort’s data sheet, RAMi can be used with the IBM i OS’s 5250 sign-on screen or invoked on demand. Upon entering their user ID, users are prompted to enter something they know (their password) and something they have (a token) to gain entry to the system.

    Syncsort offers three options for generating tokens to be used with RAMi, including:

    • Cilasoft-generated token. These codes are sent via email or as a pop-up screen in the IBM i environment. Syncsort recommends this for “less-demanding environments.”
    • A RADIUS-generated token. RADIUS is a standard protocol used for MFA, and Syncsort has included a native IBM i RADIUS client that works with existing RADIUS-based authenticators or servers.
    • An RSA-generated token. Dell’s RSA subsidiary is a leader in MFA and RAMi is certified compliant with RSA’s SecureID technology and its RADIUS servers and cloud services, which support a variety of MFA token-delivery methods (SMS message, voicemail) in addition to biometrics (fingerprint and iris recognition).

    According to Syncsort, RAMi also includes a rules engine that allows IBM i shops to use MFA with certain groups of high-risk customers (but not others) based on various criteria. Those criteria include whether the user is registered or unregistered; whether they’re a member of a certain user group; whether they possess special authorities; which IP address they’re attempting to log in from; specific days or times the log-in request occurs in; and whether they’re authenticating from a specific subsystem or iASP.

    A common theme across all three of the new or enhanced products Syncsort unveiled is ensuring compliance with new security rules. The company cited a recent survey that suggests 52 percent of Power Systems users are investing in compliance auditing and reporting in 2018. What’s more, 28 percent of Power Systems respondents said they “anticipate growing regulatory complexity as a security challenge in the coming year,” the company says.

    “The trend to ensure organizations adequately protect personal data from theft and misuse has driven increasingly strict data privacy regulations like GDPR. This has fueled the rise of regulatory compliance to become a top priority for most IT organizations,” David Hodgson, Syncsort’s chief product officer, says in a statement accompanying he announcement. “The new capabilities in our IBM i security products can be used to help avoid building compliance models from scratch.”

    The company will discuss the new product capabilities during a webinar on August 14 at 11 a.m. EDT. You can register for the event here.

    RELATED STORIES

    Syncsort Talks Rebranding, IBM i Product Strategy

    Syncsort Acquires Townsend’s IBM i Encryption Software

    GDPR and IBM i: The Final Countdown

    Syncsort Finds Security Key To Business Resilience

    Syncsort Bolsters IBM i Security Play With Cilasoft Buy

    Vision Buys Enforcive, Then Gets Sold And Merged With Syncsort

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: GDPR, IBM i, Power Systems, Syncsort

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: Refactoring RPG – Indicators IBM Readies Big Iron With “Cumulus” Power9 Chips

    Leave a Reply Cancel reply

TFH Volume: 28 Issue: 50

This Issue Sponsored By

  • T.L. Ashford
  • COMMON
  • Rocket Software
  • LUG
  • Manta Technologies

Table of Contents

  • IBM Readies Big Iron With “Cumulus” Power9 Chips
  • Syncsort Unveils MFA, Bolsters IBM i Security Suites
  • Guru: Refactoring RPG – Indicators
  • Mad Dog 21/21: Sacred Families
  • Introducing Four Hundred Guru Classic

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle