× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.
--
[ Picked text/plain from multipart/alternative ]
I saw this too and frankly, as an iSeries audit and security vendor, I was
pleased at the way the platform was correctly positioned:

"No system - including 'secure-able' iSeries, as Big Blue touts it - is
ready to take on cyberthreats out of the box. They all require steps for
optimal lockdown, and those steps require capable, technology-savvy hands.
"iSeries security isn't simple," says iSeries NEWS technical editor Wayne
Evans. "The security officer still has to decide what to secure and know the
commands to do so. To say it's easy could be somewhat misleading."

The truth is, iSeries has the best commercially available security
implementation, including the object-level security that is built in, but
the user must actively participate in security and properly configure
security-related components.  You would be surprised how many shops out
there don't even have auditing turned on (QAUDJRN)!

Steven Martinson
Product Marketing Manager, iSeries and AS/400
PentaSafe Security Technologies, Inc.
http://www.pentasafe.com
Toll Free: 1.888.400.2834, x9585
Direct Dial: 1.713.860.9585


-----Original Message-----
From: jt [mailto:jt@ee.net]
Sent: Thursday, December 13, 2001 11:59 PM
To: midrange-l@midrange.com
Subject: Security simpler and cheaper with iSeries


Saw interesting the above story in NEWS Wire Daily
(http://www.iseriesnetwork.com/nwn/story.cfm?ID=12034).

Pat Botz, IBM's lead iSeries security architect made A LOT of good comments
about the value of the iSeries.  But one thing he said sure surprised me:
"iSeries doesn't necessarily have technology that protects the system
more..."

I've always thought that object-level security, built into the TIMI, *did*
protect the system more.  Even more, I thought it was built into the
hardware registers.

I hope I'm not starting a thread on all the areas the 400 is strong and weak
on security, but just wondering about this aspect.

jt

_______________________________________________
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@midrange.com
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
or email: MIDRANGE-L-request@midrange.com
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.