• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Taking A Centralized Approach To IBM i Security

    June 7, 2021 Timothy Prickett Morgan

    We are branching out and doing new things here at IT Jungle, and one of them is using video as well as text to get information about the IBM i platform across. Video is certainly not a new thing, and we have done a bit of it as part of consulting engagements, but starting now it is going to be part of what we do on an ongoing basis. We are grateful to IBM i security and high availability software vendor Precisely for initially supporting us in this endeavor.

    For our first video interview, we sat down with John Vanderwall, who is co-founder with Carol Woodbury of DXR Security, which was founded last year by the two long-time business partners. Vanderwall is chairman and chief executive officer at DXR Security, while Woodbury is president and chief technology officer, a splitting of workload that the two have used in the past with prior companies. Rather than selling products this time around, DXR Security is more of a consultancy, and in this capacity the two co-founders have been working with Precisely to raise awareness on certain IBM i security issues. This interview was done explicitly for this purpose, and focuses on the need to have a centralized approach to security at IBM i shops.

    We were trying to get to the bottom of a number of issues that are absolutely relevant in the IT world today and certainly affect the IBM i platform, which cannot depend on “security through obscurity” as many customers have done in the past. We wanted to know what is the impact of having a centralized approach to security on IBM i, particularly knowing that traditional on-premises enterprise security environments have been decentralized. In decentralized environments, IT teams typically manage and maintain security at the platform level. You secure Windows Server this way, Windows desktops that way, Apple desktops another way, Linux servers still another way, and IBM i with its own methods.

    The centralized approach, says Vanderwall, does two important things right off the bat: It brings focus to security methods and tools, and it removes the risk of security holes and lapses to the entire business.

    “Another prime motivation for organizations to centralize especially when it comes to security is better collaboration across teams,” continues Vanderwall. “For example, its one team versus individuals scattered across the organization, so knowledge sharing and skills transfer are easier. Second, you see a benefit of more balanced budgeting. What I mean is this: because the function, in this case security, is consolidated instead of each individual fighting for a share of budget, which they may or may not get, you have one place from which to make a request. Since everyone reports into the same manager in a centralized approach, it is likely less tolerated for a portion of the team to get something implemented and the other portions getting nothing implemented. When you are de-centralized, you are scattered, non-implementation could easily be hidden by claiming that resources were needed to address other priorities. Contrast that with a centralized and consolidated approach. where security is their priority and you aren’t pulled in other directions.”

    We had a good conversation, and we hope you enjoy it and learn from it.

    This content was sponsored by Precisely.

    RELATED STORIES

    Controlling IBM i Access With Exit Points

    Strengthen IBM i Password Security With Multi-Factor Authentication

    Can You Build Data Integrity Without Securing IBM i Systems?

    A Conversation With Carol Woodbury on IBM i Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: DXR Security, IBM i, Precis

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times Forrester Consulting Weighs Costs, Benefits of IBM i

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 39

This Issue Sponsored By

  • New Generation Software
  • WorksRight Software
  • UCG Technologies
  • ARCAD Software
  • Manta Technologies

Table of Contents

  • Forrester Consulting Weighs Costs, Benefits of IBM i
  • Taking A Centralized Approach To IBM i Security
  • Guru: The Essential Workers Of IT, And Lessons Learned From Trying Times
  • As I See It: The Reluctant Return
  • Get Virtually Packed For Common Europe Power Summer Camp

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • How Committed Is Big Blue To The IBM Cloud?
  • Immutable Copies Are Only As Good As Your Validation
  • Guru: IBM i *USRPRF Security
  • ERP Transitions Loom for SAP on IBM i Customers
  • Inflation Pumps Up Global IT Spending, Supply Chain Deflates It
  • COMMON Set for First Annual Conference in Three Years
  • API Operations Management for Safe, Powerful, and High Performance APIs
  • What’s New in IBM i Services and Networking
  • Four Hundred Monitor, May 18
  • IBM i PTF Guide, Volume 24, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.