by Dawn May | Nov 14, 2017 | IBM i Services, Security
Syslog is a very popular reporting system that runs on many devices and OSes. It uses various parts and programs to encode, transmit, consolidate, and analyze messages from a wide range of devices. Everything from Windows and UNIX to firewalls and IoT devices participate in sending and centralizing messages from across the enterprise. That is, except for IBM i. Of course, we always must be different (usually for good reasons). However, when a security team wants to have an enterprise-wide view of events with a tool such as a SIEM (Security Information and Event Management), we sometimes feel left out. Until now!
(more…)
by Dawn May | Jul 12, 2016 | Networking, Security
Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you’re impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn’t always straightforward.
(more…)
by Dawn May | Oct 28, 2014 | PTFs, Security, Systems Management
There was a short statement in the IBM i 7.2 announcement: New PTF improvements for tracking of Security Audit Log. That’s not very clear is it?Starting with IBM i 7.2, you now have the ability to track PTF installation history in the security audit journal. This support extends the QAUDLVL and QAUDLVL2 system values with additional parameters to specify the type of auditing you want the system to do on PTF operations. You can track changes to the system based upon PTF activity on the system, as well as PTF object changes.
(more…)
by Dawn May | Jul 24, 2012 | Db2 for i, Security
Security never sleeps. On IBM i, we understand that we must continue to invest in delivering improved security auditing, security deployment and granularity of security controls.
(more…)