IBM i 7.3 – Network Connection Auditing

Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you’re impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn’t always straightforward.

(more…)

IBM i 7.3 Adds Authority Collection Feature

IBM i 7.3 is here! IBM i 7.3 has added a feature called “Security Authority Collection” which tracks how applications and application users “use” an object.  Inquiries against that collection will provide advice on securing critical business data and applications from intrusion by identifying who needs to have access to data and in what context.  This is a major enhancement to security management that is unique to IBM i.

(more…)