Download the “2016 State of IBM i Security Study” Guide

Learn about dangerous security vulnerabilities that affect the system in the 2016 State of IBM i Security Study.


Today's IBM i Security

Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2016 State of IBM i Security Study analyzed 177 servers and partitions.

Now in its 13th year, the study provides compelling insight into security weaknesses affecting many IBM i systems. Some of the most dangerous defects include:

  •  Unmonitored network access
  •  Lax system auditing
  •  Dangerous default security settings

The alarming results show improperly configured servers where users are allowed to keep default passwords and traffic passes through exit points like FTP and SQL unmonitored.

The 2016 State of IBM i Security Study reveals exclusive information about what tools and strategies organizations are using to secure IBM i—and where they’re leaving the platform vulnerable.


You’ll see how data on IBM i is protected in a variety of industries around the world.

Find out how businesses of varying sizes from industries like insurance, finance, and manufacturing protect the mission-critical data stored on IBM i (System i, iSeries, AS/400). The study reveals information from seven key audit areas:

Sever-level security controls

Profile and password settings

Administrative capabilities

Network-initiated commands and data access

Public accessibility to corporate data

System event auditing

Virus protection