• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Starving For IBM i Security Skills

    August 18, 2014 Dan Burger

    Skills keep organizations moving forward. The person who has skills and who can prove it is a hot commodity these days. Professional development is a great investment whether it is a company investing in its IT staff or an individual investing in his or her career. There is a skills gap and you don’t want to be on the wrong side of it, or let that gap get so wide you can’t jump back across.

    Let’s take security skills as an example.

    Many of you know Robin Tatam, a subject matter expert on security for the COMMON user group who frequently is invited to speak at IBM i technical conferences and local user group meetings. He is also director of security technologies at PowerTech, a division of HelpSystems. Tatam and I traded emails last week after I found out he recently attained a security certification from the Information Systems Audit and Control Association (ISACA).

    The more you know about security, the more apparent weaknesses become, but companies with strategies based on “close our eyes and hope for the best” are setting themselves up for disaster. There’s a difference between risk ignorance and risk avoidance. Of course, one requires no action and the other requires a level of awareness and action.

    The days of the AS/400 and iSeries platform operating on their own islands with a limited number of hands touching the system are fading fast. The systems are being increasingly integrated into the IT universe and direct access by end users is on the rise. And you can add to that intensification in hacktivism for profit cyber criminals. The world, including the IBM i world, is not such a safe place.

    “I strongly recommend that all enterprises running Power Systems servers allocate budget to train their staff in security and to establish a regime for continually assessing risk; even if they are not formally required to do so,” Tatam says. “Risk is not simply going to disappear and the number of regulatory mandates that often result from it are only going to continue to increase.”

    Tatam has 25 years of experience on the IBM i platform. He’s also the analyst and lead author of the annual State of IBM i Security study that’s been published by PowerTech for the past 11 years. His observation of the IBM i community is that few companies acknowledge risk and actively work to reduce it.

    The community, he says, is largely starved for security experts. In many cases, companies entrust system security to a person whose qualifications are summed up as “knowing the AS/400.”

    Formal certifications are one indication that a person has specific knowledge of a subject and a system.

    “Certification in the IBM i world is becoming increasingly rare, unless it is for sales and hardware engineers, or for technologies such as WebSphere,” Tatam says. “I have gained some two dozen certs from IBM over the years, but sadly I believe they are all now defunct. In the past, I have pushed IBM to consider an IBM i-centric security certification to help to educate and also to formally recognize those individuals that have the skills needed by so many organizations, but I was unable to gain any traction.”

    From Tatam’s perspective, most security certifications designate general security knowledge and do not touch upon Power Systems servers. He also believes most of the IBM i security experts started in other disciplines of IBM i and extended their skills to security. He includes himself in that category.

    “The cold, hard reality is that we have a long journey ahead of us and we will continue to rely heavily on outside expertise,” he says.

    Based on his own experience teaching IBM i security topics, he says many people are at the basic level of controls such as exit points and system values.

    “Object-level security remains the domain of the brave, and reliance is often placed with the software vendor to ensure that their application is secure,” he says.

    Regarding his recent Certified Information Security Manager certification from ISACA, it is an investment in understanding risk and governance. Tatam sees it as a means to establish that he has the skills to conduct and manage security engagements. Formal auditors, in his view, are renowned for their lack of IBM i understanding. “Therefore, they are prone to missing the strengths–and arguably the weaknesses–of the platform. This leads to a major disconnect between the people that are configuring the server’s controls and those that are overseeing that configuration.”

    RELATED STORIES

    IBM i Security Assessment: How About Now?

    IBM i 7.2 Tightens Data Access And Security

    Popping The IBM i Security Bubble

    State Of IBM i Security? Dismal As Usual, PowerTech Says

    It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says

    The 10-Year Security Itch Needs Scratching



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: More On Porting User Profiles Between IBM i Partitions VAI Gives Berk Enterprises a New Analytic View

    Leave a Reply Cancel reply

Volume 24, Number 27 -- August 18, 2014
THIS ISSUE SPONSORED BY:

Profound Logic Software
ARCAD Software
System i Developer
Manta Technologies
WorksRight Software

Table of Contents

  • Power8 Packs More Punch Than Expected
  • ManH Dives Into ‘Clienteling’ with GlobalBay Buy
  • Starving For IBM i Security Skills
  • Mad Dog 21/21: On Whom IBM Now Depends
  • Coming Face To Face With An IBM i Recruit
  • IBM HyperSwap And Vision Solutions: Another View
  • Agilysys in Transition; Revenue Falls Short of Goal
  • Dell, HP Chase Upgrades From Windows Server 2003; Whither IBM?
  • IBM Bolsters Security Wares With Lighthouse, Crossideas Acquisitions
  • Manta Continues To Take The IBM i To School

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle