Market Need for iSecurity
Professional information security solutions for IBM i have become a must-have factor in the survival of any company in today's marketplace.
IBM IBM i's integrated security, however, does not provide a satisfactory security solution - it only includes a security infrastructure, leaving it to
professional security solutions such as iSecurity
to turn this infrastructure into a manageable and beneficial tool for managers and auditors. For example: IBM's exit point architecture exists, but companies lack the resources to utilize it without a solution like
QAUDJRN log information may be all there but its esoteric codes are unreadable without a solution such as
For detailed information on the adequacy of IBM i's integrated security, see Raz-Lee's Blog article.
Major Factors Contributing to the Importance of Security Solutions Today
In today's market, corporate scandals have generated high regulatory involvement by the government, and new laws are being continuously enacted to enhance the quality of corporate reporting. New government regulations such as the Sarbanes-Oxley Act (SOX), HIPAA and PCI have significantly impacted business and various other industries, presenting serious challenges to enterprises. Accordingly, the importance of auditing is increasingly mounting, especially in the financial and healthcare industries, in both public and private enterprises.
For more information, see IT Governance Institute (ITGI) – Best Practices for Complying with IT Security Regulation
Studies have shown that the most significant threat to an organization's information systems comes from inside the organization. Large companies worldwide are now concerned with protecting business-critical information from unauthorized use by company personnel. Consequentially, control and follow-up on user access has become a necessity.
For a BBC article on a high-profile insider attack at Sumitomo London Bank, see "The Enemy Within"
Cyber Attacks and Hacking
IBM i servers are subject to a wide range of risks as a direct result of operating in an open TCP/IP environment. Many activities that were previously impossible in the closed AS/400 environment are now easily carried out remotely, such as initating commands, installing or activating programs, updating or erasing data, and moving or copying files to and from IBM i servers.
Read about Fraud in Socie'te' Ge'ne'rale European Bank
Read about Tax Fraud in Liechtenstein