Covering the exit points is, in my opinion, a necessity but don't overlook object security itself. A good object security scheme is your front line on security. For example secure your database so only authorized individuals can access it. This will secure your database regardless of the client used to access it. Your exit point programs can then focus on which clients you want to allow access to your system and what functions you want to allow them to use.
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Sam_L
Sent: Sunday, December 02, 2012 5:57 PM
Subject: Remote Access Security, 3rd Party Tool
More of our non-IT employees are getting VPN access to our AS/400. Need to start controlling that access.
Exit points are probably the only solution to handle ODBC, FTP, JDBC, SQL, etc access. It seem to me that a 3rd party tool is something we should investigate, because there are an awful lot of exit points to cover by ourselves.
If anyone is using a Remote Access Security Manager and feels free to provide the name and comment on the effectiveness, ease of use and support, it would be appreciated.
In a former life, where I wasn't the responsible party, we installed a 3rd party tool that kept out the riff-raff--I can't recall the name, but it was extremely granular and thus quite complex to manage. My research so far indicates that Powertech, Net IQ (was Pentasafe)and Enforcive (was BSafe) have products.
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l