A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...
With the new SEQUEL ViewPoint repository, it’s easier than ever to manage, find, and run your SEQUEL objects. Learn more about the benefits of the repository.
CDW, a leading provider of technology solutions for business, government, and healthcare, was challenged with meeting strict compliance requirements with minimal staff. The company turned to Powertech Security Auditor to reduce manual processes
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.