Qualys should be capable of finding all sorts of issues on the IBM i
servers at a network level... it should find config/version items with DNS
BIND versions, mail forwarding settings, POP3 server related items, and a
bunch of other possible items if they exist. They won't be checking for 'i
specific' vulnerabilities or settings, but Qualys will basically be running
checks and exploits against an IP address and recording what's found.

From: Phil McCullough <Phil.McCullough@xxxxxxxx>
To: "'Midrange Systems Technical Discussion'"
Date: 04/09/2012 02:26 PM
Subject: Internal Vulnerability Scanning for IBM-i
Sent by: midrange-l-bounces@xxxxxxxxxxxx

We're looking at purchasing the QUALLYS system for internal vulnerability
scanning (PCI ya-know).
They don't appear to be able to scan IBM-I's , but we noted that NESSUS
just announced an IBM-I plug-in for this ($1,500/year).
Our auditor told us that QUALYS was the industry leader, but scanning the
IBM-I seems like something good practices would dictate.
Anyone with experience with this. Any suggestions?

This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


Scanned by IBM Email Security Management Services powered by MessageLabs.
For more information please visit

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2021 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.