RETIRED CONTENT

Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

“Security by obscurity” doesn’t work anymore for IBM i. Modernization efforts have increased the attack surfaces as companies web-enable legacy applications, integrate with other platforms, and expand IBM i’s overall network presence.

Further increasing the risks is that security best practices are often neglected due to the perception that IBM i is secure “out-of-the-box.” IBM i is capable of being a highly secure platform, but only if you leverage the available security features. The security practices from the AS/400 days are no longer good enough.

This storyboard provides guidelines to:

  • Address modern security risks from external Internet-based attacks to application vulnerabilities such as SQL injection and cross-site scripting.
  • Implement appropriate guidelines for assigning special authority access rights.
  • Establish best practices for security monitoring.

Related Content

Hide Details

Search Code: 58533
Published: May 2, 2013
Last Revised: May 2, 2013

Social

1 Download

Secure IBM i Systems to Meet Today's Risks Storyboard Sample
OR
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.