• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Taking A Centralized Approach To IBM i Security

    June 7, 2021 Timothy Prickett Morgan

    We are branching out and doing new things here at IT Jungle, and one of them is using video as well as text to get information about the IBM i platform across. Video is certainly not a new thing, and we have done a bit of it as part of consulting engagements, but starting now it is going to be part of what we do on an ongoing basis. We are grateful to IBM i security and high availability software vendor Precisely for initially supporting us in this endeavor.

    For our first video interview, we sat down with John Vanderwall, who is co-founder with Carol Woodbury of DXR Security, which was founded last year by the two long-time business partners. Vanderwall is chairman and chief executive officer at DXR Security, while Woodbury is president and chief technology officer, a splitting of workload that the two have used in the past with prior companies. Rather than selling products this time around, DXR Security is more of a consultancy, and in this capacity the two co-founders have been working with Precisely to raise awareness on certain IBM i security issues. This interview was done explicitly for this purpose, and focuses on the need to have a centralized approach to security at IBM i shops.

    We were trying to get to the bottom of a number of issues that are absolutely relevant in the IT world today and certainly affect the IBM i platform, which cannot depend on “security through obscurity” as many customers have done in the past. We wanted to know what is the impact of having a centralized approach to security on IBM i, particularly knowing that traditional on-premises enterprise security environments have been decentralized. In decentralized environments, IT teams typically manage and maintain security at the platform level. You secure Windows Server this way, Windows desktops that way, Apple desktops another way, Linux servers still another way, and IBM i with its own methods.

    The centralized approach, says Vanderwall, does two important things right off the bat: It brings focus to security methods and tools, and it removes the risk of security holes and lapses to the entire business.

    “Another prime motivation for organizations to centralize especially when it comes to security is better collaboration across teams,” continues Vanderwall. “For example, its one team versus individuals scattered across the organization, so knowledge sharing and skills transfer are easier. Second, you see a benefit of more balanced budgeting. What I mean is this: because the function, in this case security, is consolidated instead of each individual fighting for a share of budget, which they may or may not get, you have one place from which to make a request. Since everyone reports into the same manager in a centralized approach, it is likely less tolerated for a portion of the team to get something implemented and the other portions getting nothing implemented. When you are de-centralized, you are scattered, non-implementation could easily be hidden by claiming that resources were needed to address other priorities. Contrast that with a centralized and consolidated approach. where security is their priority and you aren’t pulled in other directions.”

    We had a good conversation, and we hope you enjoy it and learn from it.

    This content was sponsored by Precisely.

    RELATED STORIES

    Controlling IBM i Access With Exit Points

    Strengthen IBM i Password Security With Multi-Factor Authentication

    Can You Build Data Integrity Without Securing IBM i Systems?

    A Conversation With Carol Woodbury on IBM i Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: DXR Security, IBM i, Precis

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times Forrester Consulting Weighs Costs, Benefits of IBM i

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 39

This Issue Sponsored By

  • New Generation Software
  • WorksRight Software
  • UCG Technologies
  • ARCAD Software
  • Manta Technologies

Table of Contents

  • Forrester Consulting Weighs Costs, Benefits of IBM i
  • Taking A Centralized Approach To IBM i Security
  • Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times
  • As I See It: The Reluctant Return
  • Get Virtually Packed For Common Europe Power Summer Camp

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Power11 Transistor Count Discrepancies Explained – Sort Of
  • Is Your IBM i HA/DR Actually Tested – Or Just Installed?
  • Big Blue Delivers IBM i Customer Requests In ACS Update
  • New DbToo SDK Hooks RPG And Db2 For i To External Services
  • IBM i PTF Guide, Volume 27, Number 33
  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle