Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.