Keeping your IBM i secure in the ever-changing world of Internet technology requires constant diligence. You may believe you locked down your network a few years ago—or that your IBM i (AS/400, iSeries) systems are totally insulated from the Internet—but that brief timespan is a lifetime on the Internet.
New Technology, New Security Risks
Disruptive new technologies abound: cloud services, the Internet of Things (IoT), big-data aggregation, and new development platforms like node.js. With these come a host of fresh vulnerabilities: ransomware, session hijacking, malicious sensor data, encrypted transaction flaws, and new denial of service attacks. Unless you’ve added protection for these, your IBM i is likely exposed.
Contrary to popular belief, the IBM i is not an obscure backwater on the Internet. Its excellent internal security and legendary reliability make it a solid platform for integrating new Internet technologies with legacy business processes in industries such as healthcare, finance, manufacturing, and distribution.
Join IT industry expert Mel Beckmand and IBM i security pro Robin Tatam for a discussion about state-of-the-art tools you can use to protect your IBM i, including:
- Automated vulnerability assessment (VA)
- Intrusion detection and prevention systems (IDS/IPS)
- Security information and event management (SIEM)
- Configuration audit and change management systems
Get a quick snapshot of your IBM i security posture and learn how to reduce risks to your business-critical data.