IBM i 7.3 – Network Connection Auditing

Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you’re impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn’t always straightforward.

(more…)

IBM i 7.3 Adds Authority Collection Feature

IBM i 7.3 is here! IBM i 7.3 has added a feature called “Security Authority Collection” which tracks how applications and application users “use” an object.  Inquiries against that collection will provide advice on securing critical business data and applications from intrusion by identifying who needs to have access to data and in what context.  This is a major enhancement to security management that is unique to IBM i.

(more…)

Java on IBM i Security Updates

We all know that security vulnerabilities seem constant and ensuring you have the correct level of software to eliminate those vulnerabilities is very important. 

The IBM Technology for Java JVM is a common code base that runs on IBM i, so if updates are made to that code base, you need to ensure you get those same updates on your i. 

(more…)

IBM i 7.2 Enhancements for Permanent Storage Tracking

In the 7.2 release, IBM made many changes to improve temporary storage tracking. I’ve written about these enhancements in IBM i 7.2 Improved Temporary Storage Tracking Part 1Part2, and Part 3 blogs. You may also want to reread the blog, Understanding Disk Space Usage, which reviews IBM i temporary and permanent storage concepts. 

In addition to improving temporary storage tracking, IBM also made some improvements for permanent storage tracking in the 7.2 release. This post reviews three of them. 

(more…)