13 Tips to Write Secure Applications
and Boost IBM i Security
Security. It surrounds every aspect of life in the new millennium, and it’s never going away. So who’s responsible for the security of an IBM i server and DB2 database? IBM builds the hardware and develops the operating system, application vendors and internal programmers write the business applications, and users maintain the corporate data. This exclusive white paper highlights 13 key areas to consider when securing data and maintaining compliance, along with recommendations on how to address them.
Getting Started with IBM i Security
No system stays bulletproof forever. From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your iSeries security back to its former glory.
The 2013 State of IBM i Security Study
IBM i remains one of the most securable servers, but poor configuration and missing security controls can result in unauthorized data access, fraud, or worse. This study shows you the most common and dangerous IBM i security exposures and outlines how to correct them. Download the White Paper to learn the 6 dangerous IBM i configuration defaults, IBM-recommended security levels and settings, and the most common lapses in IBM i compliance.
Part-Time Superman—Managing Users with Elevated Privileges
One of the greatest challenges to securing any IBM i environment is protecting the system from the people charged with its care: programmers, administrators, and security officers. This session covers vulnerabilities associated with powerful users and how to regain the control your auditors demand while allowing your administrators and programmers to do their jobs.
Developing Secure Applications
Although your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level. This session covers the most important security considerations for programmers as they design their applications.
Reduce the Cost and Effort of IBM i Auditing
At one time or another, every system administrator and security officer faces the question “Who did it?” IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information? This session covers security details, configuration metrics, and other information auditors want to see.
A Primer on IBM i User Profiles and How To Properly Deploy Them
Few areas affect the security of your IBM i server as much as your user profiles. Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data. View this important session to learn about the security aspects of user profiles.
A Decade of IBM i Security: The Good, the Bad, and the Ugly
Don’t miss a decade’s worth of research on the security configurations of IBM-i based servers and the successes and failures of organizations that run critical applications on them. Over the last 10 years, PowerTech has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls. Join us for the 10th anniversary of this wildly popular study: The State of IBM i Security.
Let's Stay Connected!
Get the latest from PowerTech
Sign-up for PowerTech's monthly e-newsletter PowerNews and the latest Webinar invites, training, information, product news, and more
For centuries, the Seneca people have made their home in the western portion of what is now New York state. Today the Seneca Gaming Corporation operates a number of casinos, hotels, and golf courses in the area, and PowerTech helps keep their data secure.
C&D used PowerTech Authority Broker's detective reporting capabilities to ensure compliance with Sarbanes-Oxley requirements.
PowerTech Network Security provides consistent monitoring and control of internal access to First Security Bank's iSeries systems.
Bank of Stockton uses PowerTech automated solutions help improve security and compliance.