System Security and Auditing for IBM i



Similar documents
Strengthen security with intelligent identity and access management

IBM Business Analytics: Finance and Integrated Risk Management (FIRM) solution

Cloud Security Who do you trust?

IBM Security Intrusion Prevention Solutions

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Reducing the cost and complexity of endpoint management

Securing and protecting the organization s most sensitive data

Answers to Top BRMS Questions

IBM Security Privileged Identity Manager helps prevent insider threats

White paper December Addressing single sign-on inside, outside, and between organizations

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations

Easily deploy and move enterprise applications in the cloud

Strategies for assessing cloud security

Provide access control with innovative solutions from IBM.

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software

Realizing business flexibility through integrated SOA policy management.

IBM Tivoli Storage Manager for Virtual Environments

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

High-Performance Business Analytics: SAS and IBM Netezza Data Warehouse Appliances

IBM Policy Assessment and Compliance

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

IBM Cloud: Rethink IT. Reinvent business.

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

IBM Storwize V7000: For your VMware virtual infrastructure

Driving workload automation across the enterprise

Modernizing enterprise application development with integrated change, build and release management.

Datalogix. Using IBM Netezza data warehouse appliances to drive online sales with offline data. Overview. IBM Software Information Management

Gain a competitive edge through optimized B2B file transfer

IBM Rational AppScan: Application security and risk management

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Preemptive security solutions for healthcare

IBM WebSphere Application Server Family

Address IT costs and streamline operations with IBM service desk and asset management.

Provider Registries: Reduce Health System Costs, Increase Efficiencies, Improve Care

SINGLE SIGNON FUNCTIONALITY IN HATS USING MICROSOFT SHAREPOINT PORTAL

IBM Tivoli Remote Control

UPSTREAM for Linux on System z

IBM Tivoli Directory Integrator

IBM Endpoint Manager for Core Protection

IBM Coremetrics Web Analytics

IBM Tivoli Federated Identity Manager

Zend and IBM: Bringing the power of PHP applications to the enterprise

Virtualizing disaster recovery using cloud computing

A discussion of information integration solutions November Deploying a Center of Excellence for data integration.

White paper September Realizing business value with mainframe security management

Cloud Security Who do you trust?

Taking control of the virtual image lifecycle process

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM Storwize V5000. Designed to drive innovation and greater flexibility with a hybrid storage solution. Highlights. IBM Systems Data Sheet

IBM Rational systems and software solutions for the medical device industry

Web servers and WebSphere Portal

IBM Information Archive for , Files and ediscovery

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

The IBM Cognos family

Overcoming challenges of asset management amid declining federal budgets

IBM Unstructured Data Identification and Management

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite

IBM SmartCloud Workload Automation

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security QRadar Vulnerability Manager

8 Steps to Holistic Database Security

When millions need access: Identity management in an increasingly connected world

Cloud-ready network architecture

Solutions for Communications with IBM Netezza Network Analytics Accelerator

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Build an effective data integration strategy to drive innovation

IBM Maximo Asset Management Essentials

Four keys to effectively monitor and control secure file transfer

IBM Content Integrator Enterprise Edition, Version 8.5.1

BLACKICE ERA and PureData System for Analytics

Master data management vision and value: Part 2

Stay ahead of insiderthreats with predictive,intelligent security

IBM ediscovery Identification and Collection

IBM Tivoli Netcool Configuration Manager

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Create Operational Flexibility with Cost-Effective Cloud Computing

Maximizing Cross-Platform Application Availability

Using Data Mining to Detect Insurance Fraud

IBM Software Master data management vision and value: Part 1

The IBM Cognos family

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Using the cloud to improve business resilience

IBM Security QRadar Risk Manager

The case for cloud-based data backup

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM

A proven 5-step framework for managing supplier performance

Making confident decisions with the full spectrum of analysis capabilities

Safeguarding the cloud with IBM Dynamic Cloud Security

IBM and Comverse BSS/OSS Solution

Continuing the MDM journey

IBM PureApplication System for IBM WebSphere Application Server workloads

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Netcool network management solutions for SMB

Address IT costs and streamline operations with IBM service request and asset management solutions.

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Effective storage management and data protection for cloud computing

IBM Tivoli Netcool network management solutions for enterprise

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Transcription:

IBM Systems Lab Services and Training Power Services System Security and Auditing for IBM i Security breach prevention and protection

2 System Security and Auditing for IBM i Highlights Reduce the risk of business and data loss and consequences of a disruption in IT services Lower the cost of user administration and management Uncover exposures and administrative oversights Policy and standards analysis Audit and compliance reporting Create an environment for trusted computing Security in an on-demand, complex world Privacy and data protection are the responsibility of all. In a world where data is easily acquired, shared and stored (and potential data misuse is a concern) everyone must do their part to handle information in compliance with their company s requirements and values. Cost of poor security practices IBM research indicates security expenses are growing three times faster than IT budgets. Mounting regulatory and compliance mandates carry stiff government penalties and fines if ignored; every-growing volumes of data tax infrastructures and control capabilities; customer records disappear with alarming frequency; and security breaches cost an average of $6.6 million per incident. With the added pressure of a challenging economy, to compete effectively a business cannot tolerate any security exposures. From a minor breach like exposing one s password to a peer or major failure like the disclosure of client data, neither are unacceptable and can result in new administrative procedures, a failed audit or lost business. Some circumstances could even lead to a lawsuit. Security offerings Engage the experts of IBM Systems Lab Services and Training to help uphold your company s commitment to privacy and data security. Our team has developed a multitude of offerings to address your specific security concerns. Security Consulting and Risk Assessment Consulting and Implementation Services From help implementing a security feature to additional resources to supplement your staff, our Consulting and Implementation Services provide general and custom consulting. Services include password elimination and single sign-on, data and tape encryption, system auditing setup and analysis, security assessments, breach analysis and penetration testing and IBM WebSphere Application Server health checks. Audit Journal Analysis Tool User activity and system/application auditing is a requirement for most companies. The Audit Journal Analysis Tool simplifies the task of viewing entries in the IBM i security audit journal. It provides flexibility and a statistical view of the number of entries occurring in each journal entry. The security administrator can select an entry by date, time or type, drill down for details and optionally print or send an output file. The tool includes features for managing journal receivers, reporting on special authorities, monitoring for the entries defined in the Exit Point Manager and a report scheduler.

Power Services IBM i Risk Check Tool Regular assessments are key to uncover previously hidden or incorrectly administered security issues. The IBM i Risk Check Tool provides information on the security risks of an IBM i system. It collects 800+ pieces of administrative and statistical information relative to security including user and group profiles, network configuration, operational configuration, application administration, system settings, audit journal and more. The tool places that data in a single location for viewing. An easy-to-use browser page provides interpretation of the results. IBM i Security Assessment Tool (isat) Similar to the IBM i Risk Check Tool, the isat is an exhaustive collection tool, often used during a security assessment to help document findings. It can also be purchased separately for customers wishing to enhance their reporting ability. Statistics provided include detailed reporting of more than 70 areas on the IBM i, an executive summary, top ten findings and mediation plan. Single sign-on Enterprise Identity Mapping (EIM) The need for multiple user registries, an issue most network enterprises face, creates a larger administrative challenge. EIM for the IBM i platform offers administrators and application developers an inexpensive solution for easier management of multiple user registries and user identities. EIM creates a system of identity mappings, called associations, between various user identities in various user registries. It provides a common interface across platforms to look up relationships between user identities. Use EIM in conjunction with the IBM i network authentication service for a single sign-on environment. You can even configure and manage EIM through the IBM i graphical user interface. EIM Populator Tool (EPT) One of the most time consuming tasks in implementing a single sign-on solution is registering users to the EIM repository. The EPT is a Java-based desktop GUI application that allows an administrator to easily import information from a comma separated value text file. With EPT, take a spreadsheet of known user IDs and/or names and create identifiers and mappings for each user. Java 1.4 or higher is required. Password Security Password Validation Tool Despite warnings, one-in-five users choose a non-compliant password to protect their identity. We ve developed a program that validates and ensures passwords meets company and industry recommended rules and guidelines. The tool also allows the security administrator to establish a dictionary of excluded terms, to further tighten password security. Network Password Synchronization Users often have different passwords for each system or application they access. To simplify password management, the Network Password Synchronization tool allows a user to manage a single password (or many) for multiple systems and applications in one place. Who We Are IBM Systems Lab Services and Training develop and deploy solutions across IBM systems offerings. Our team of experts are well-versed in product knowledge and platform specific hardware and software solutions for clients and IBM Business Partners. In addition to skills honed in IBM development labs, our consultants bring experience gleaned from thousands of worldwide engagements, development to implementation.

4 System Security and Auditing for IBM i The Lab Services mission Our mission is to help accelerate the adoption of new IBM products and offerings and maximize the performance of client systems. Our consultants leverage their relationships with IBM labs to build deep technical skills and bring the latest technology to our clients and partners. Not just any service Part of IBM labs, IBM Systems Lab Services and Training help build products. Take advantage of our deep knowledge to achieve the goals of your technology and solution investment. We complement IBM and IBM Business Partner service offerings, making it easy and financially reasonable to put our experiences to work. IBM Systems Lab Services and Training We offer services in all aspects of managing IBM Power Systems environments, including installation, migration, porting, platform management, consulting and training. Take advantage of our always-current knowledge of products and solutions for virtualization, high availability, high performance computing and server consolidation. For more information Learn more about System Security and Auditing for IBM i and related services. Contact stgls@us.ibm.com or visit: ibm.com/systems/services/labservices Lab Services tools Many of our solutions were built in response to customer requirements to fill product gaps, or a request to further enhance our products. They range from easy to install tools and utilities to more complex solutions; the latter often includes a services component intended to provide technical training and implementation services so clients and business partners can acquire and maintain mission critical skills. How are these offerings acquired? The utilities described here are offerings provided by IBM Systems Lab Services and Training and unless noted otherwise packaged as part of a consulting services engagement. Offering consists of the software license and maintenance, as well as planning, design and implementation services. Pricing Contact an opportunity manager to confirm requirements, define the scope of work, develop a services proposal and determine pricing.

Power Services

Copyright IBM Corporation 2011 IBM Corporation Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America April 2011 All Rights Reserved IBM, the IBM logo, ibm.com, Power Systems and WebSphere are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. Please Recycle POB03038-USEN-00