• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Taking A Centralized Approach To IBM i Security

    June 7, 2021 Timothy Prickett Morgan

    We are branching out and doing new things here at IT Jungle, and one of them is using video as well as text to get information about the IBM i platform across. Video is certainly not a new thing, and we have done a bit of it as part of consulting engagements, but starting now it is going to be part of what we do on an ongoing basis. We are grateful to IBM i security and high availability software vendor Precisely for initially supporting us in this endeavor.

    For our first video interview, we sat down with John Vanderwall, who is co-founder with Carol Woodbury of DXR Security, which was founded last year by the two long-time business partners. Vanderwall is chairman and chief executive officer at DXR Security, while Woodbury is president and chief technology officer, a splitting of workload that the two have used in the past with prior companies. Rather than selling products this time around, DXR Security is more of a consultancy, and in this capacity the two co-founders have been working with Precisely to raise awareness on certain IBM i security issues. This interview was done explicitly for this purpose, and focuses on the need to have a centralized approach to security at IBM i shops.

    We were trying to get to the bottom of a number of issues that are absolutely relevant in the IT world today and certainly affect the IBM i platform, which cannot depend on “security through obscurity” as many customers have done in the past. We wanted to know what is the impact of having a centralized approach to security on IBM i, particularly knowing that traditional on-premises enterprise security environments have been decentralized. In decentralized environments, IT teams typically manage and maintain security at the platform level. You secure Windows Server this way, Windows desktops that way, Apple desktops another way, Linux servers still another way, and IBM i with its own methods.

    The centralized approach, says Vanderwall, does two important things right off the bat: It brings focus to security methods and tools, and it removes the risk of security holes and lapses to the entire business.

    “Another prime motivation for organizations to centralize especially when it comes to security is better collaboration across teams,” continues Vanderwall. “For example, its one team versus individuals scattered across the organization, so knowledge sharing and skills transfer are easier. Second, you see a benefit of more balanced budgeting. What I mean is this: because the function, in this case security, is consolidated instead of each individual fighting for a share of budget, which they may or may not get, you have one place from which to make a request. Since everyone reports into the same manager in a centralized approach, it is likely less tolerated for a portion of the team to get something implemented and the other portions getting nothing implemented. When you are de-centralized, you are scattered, non-implementation could easily be hidden by claiming that resources were needed to address other priorities. Contrast that with a centralized and consolidated approach. where security is their priority and you aren’t pulled in other directions.”

    We had a good conversation, and we hope you enjoy it and learn from it.

    This content was sponsored by Precisely.

    RELATED STORIES

    Controlling IBM i Access With Exit Points

    Strengthen IBM i Password Security With Multi-Factor Authentication

    Can You Build Data Integrity Without Securing IBM i Systems?

    A Conversation With Carol Woodbury on IBM i Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: DXR Security, IBM i, Precis

    Sponsored by
    Raz-Lee Security

    Protect Your IBM i and/or AIX Servers with a Free Virus Scan

    Cyber threats are a reality for every platform, including IBM i and AIX servers. No system is immune, and the best defense is prompt detection and removal of viruses to prevent costly damage. Regulatory standards across industries mandate antivirus protection – ensure your systems are compliant and secure.

    Get My Free Virus Scan

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times Forrester Consulting Weighs Costs, Benefits of IBM i

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 39

This Issue Sponsored By

  • New Generation Software
  • WorksRight Software
  • UCG Technologies
  • ARCAD Software
  • Manta Technologies

Table of Contents

  • Forrester Consulting Weighs Costs, Benefits of IBM i
  • Taking A Centralized Approach To IBM i Security
  • Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times
  • As I See It: The Reluctant Return
  • Get Virtually Packed For Common Europe Power Summer Camp

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle