• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • iSecurity Experts: New Name, Familiar Face, Services a Priority

    June 30, 2009 Dan Burger

    There’s a new security company specializing in helping IBM AS/400 shops deal with their security issues, but there’s no lack of experience in the services it will provide. Many of you know the name John Earl. After 20-some years in the business, he’s one of the AS/400 (iSeries, System i, and IBM i) community’s most familiar faces. He’s a noted speaker, author, and security expert. And now he’s running his own consulting business called iSecurity Experts.

    Adding his name to your contact list might be a good idea if your company has been audited or is about to be. In the age of regulatory compliance, there’s plenty of auditing going on. Those affected by Sarbanes Oxley, HIPAA, the Payment Card Industry Security Standards, and others know this as a fact. And those who are struggling to put together a solid security program that fits the requirements may need some help. Earl has been providing security advice his entire career, and he knows the ins and outs of regulatory compliance audits.

    “Dealing with audits can be like going into the jungle without a guide for many companies,” Earl said last week on the phone. “If the IT staff at a company hasn’t done a bunch of security compliance work, and it goes in without a guide, it’s going to take longer and it’s going to take more money. If you go with someone who has been down the trails, it will be a much less ‘exciting’ adventure, but in this business, boredom is good thing.”

    After an audit takes place, a company needs to respond. Earl says he can help a company respond quickly, efficiently, and at the lowest cost.

    Two organizations that he’s working with now both went through the auditing process recently and had problems that will need attention. Earl says their first question was “how do I solve this?”

    My first question to Earl was what are the ramifications of an audit that points out security issues?

    “There are potential penalties, but they are not very likely,” he says. “It’s possible to fail and audit and be fined. But I haven’t seen that happen to any company, even though I wouldn’t be surprised to learn that it had.

    “What is more likely to happen involves all kinds of pressure beyond fines. If you fail a Sarbanes Oxley audit, you have to put a ‘material deficiency’ report in your quarterly 10K financial statement that is filed with the U.S. Securities and Exchange Commission. It would, for instance, say that auditors have come in and noticed that the AS/400 security was screwed up. That’s not something an organization wants to have on record.”

    You can see why this might get the attention of some executives who otherwise wouldn’t be paying attention to AS/400 security. Having AS/400 security as an agenda item at an executive board meeting is a pretty bright spotlight. This type of increased visibility tends to make people in the IT department a little edgy.

    “I think the biggest problem with security has been getting visibility high enough in the organization to devote resources to fix problems,” Earl says. “If you look at a small to mid size company, the system manager, or the IT manager, may have been trying to solve a security problem for years, but was not getting budget approval. When that same issue hits the board, and they ask why haven’t you done it, and the answer is it costs $30,000, the board’s response is going to be ‘spend it! Get it off my plate! I don’t want this showing up in my 10K report. Solve the problem.'”

    Not everyone is willing to wait until an audit has been done and the deficiencies have come to light. For those who prefer to prevent fires rather than having to put them out, iSecurity Experts offers a pre-audit service, which means Earl does some advance scouting to let the company know where it is going to have issues. He also works with the company to correct the issues before the auditors show up at the door.

    Regardless of which regulatory mandate a company is wrestling with, Earl says the security framework for 90 percent of the compliance is found in two highly regarded standards: COBIT 4.1 and ISO 27002.

    Creating and maintaining policies based on COBIT and ISO becomes the foundation of a secure system. Once the foundation is established, the individual requirements of specific regulatory compliance are relatively small pieces, he says.

    Prior to forming the iSecurity Experts consulting firm, Earl was vice president and chief technology officer at PowerTech, a provider of security software and services for the AS/400 market. He’d been with PowerTech since 1998, when PowerTech purchased Earl’s start-up security software company called Lighthouse Software. In the early years of his career, he worked as a systems supervisor, information systems manager, and senior systems programmer. He’s had a long affiliation with the COMMON user group, and has served on that organization’s board of directors.

    You can find out more about iSecurity Experts on its fledgling Web site yet, or you can contact Earl via e-mail at john.earl@isecurityexperts.com or by phone at 206-669-3336. For those associated with the LinkedIn professional networking Web site, you’ll find John Earl and iSecurity Experts there, as well.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Linoma Software:  Learn how to protect your data and get a free trial
    CNX:  Valence is bringing Web 2.0 to System i. Download a FREE 90-day trial
    ProData Computer Services:  Simplify your iT with DBU, DBU RDB, and RDB Connect

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Dumb Behavior Spreads as Smart Devices Proliferate Microsoft Virtualization for the i Guys, Revisited

    Leave a Reply Cancel reply

Volume 9, Number 26 -- June 30, 2009
THIS ISSUE SPONSORED BY:

ARCAD Software
Bytware
Seagull Software
Cosyn
Twin Data

Table of Contents

  • Infor Sheds More Light on ‘Flex’ Upgrade and Migration Programs
  • Thales Key Manager Lowers Barriers to Encryption
  • iSecurity Experts: New Name, Familiar Face, Services a Priority
  • iBridge Traverses System i-Windows Divide for ACOM
  • IBM Lotus Brings Connections to the Cloud
  • Truck Routing Software Takes Carbon Emissions Into Account
  • Talend Goes Real Time with Data Integration Software
  • Computer Guidance Goes SaaS with Construction Industry App
  • SafeData Now Protects AIX Data, Too
  • LANSA White Paper Tackles Supply Chain Synchronization

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle