IBM Power Systems and AIX give you the means to verify the identities of principals on physically insecure networks. Use IP security to encrypt, authenticate and provide data-integrity checking that enables corporations to leverage the pervasiveness and affordability of the Internet on a global scale.

Virtual private network (VPN)
A virtual private network (VPN) is an extension of an enterprise's private intranet across a public network such at the Internet, creating a secure private connection, essentially through a private tunnel. VPNs securely convey information across the Internet, connecting remote users, branch offices and business partners in an extended corporate network. A VPN provides security through authentication and encryption.

  • Internet protocol security and IKE
    IP security enables secure communications over the Internet and within company networks by securing data traffic at the IP layer.
  • Network filtering
    Filter rules can control many aspects of communications, including source and destination addresses and masks, protocol, port number, direction, fragment control, source routing, tunnel and interface type.

Open secure shell (OpenSSH)
Open Secure Shell (OpenSSH) is an open source version of the SSH protocol suite of network connectivity tools. The tools provide shell functions that are authenticated and encrypted. OpenSSH is reliable and secure and is widely accepted in the IT industry.

Deliver secure network access for your local and remote users with an authentication, authorization, and accounting system designed to provide centralized user authentication. AIX RADIUS server uses the RADIUS protocol and is included with AIX 5L (V5.3).

Kerberos is a network authentication service that provides a means of verifying identities on physically insecure networks. Many AIX applications such as OpenSSH and Fast Connect have been Kerberos enabled.

TCP/IP security
This guide describes security concerns related to TCP/IP.

Network services
Access information about identifying and securing network services with open communication ports.

Public key infastructure (PKI)
Users can be authenticated with a PKI certificate and a password during log-in. PKI certificates are based on public key/private key technology.

Secure remote shell commands
Learn to understand secure remote commands.

Network Information Services (NIS) and NIS+
NIS+ security serves two purposes: authentication to identify NIS+ principals and authorization to specify access rights.

Contact IBM

Browse Power Systems

Next generation applications for big data and analytics and cognitive computing are providing unprecedented insights into opportunities, threats and efficiencies. IBM Power Systems is at the forefront of delivering solutions to gain faster insights from analyzing both structured information and unstructured big data. With the secure, flexible and open platform of IBM Power Systems plus solutions and software, organizations can outpace their competitors by delivering faster services, providing differentiated offerings and turning operational cost into investment opportunity.

IBM Power Systems hardware is at the heart of enabling major business and industry transformations fueled by the explosive growth of big data and analytics. Power Systems help organizations drive faster business insights with industry leading performance, scalability and virtualization flexibility.

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

IBM's integrated approach to developing Systems and Systems Software stacks together delivers a platform that supports next generation applications for big data and analytics and cognitive computing on an open platform for choice while providing maximum utilization, availability, and flexibility to help you deliver new advantages to your business.

IBM and IBM Business Partner solutions exploit key benefits in IBM Power Systems’ unique design combined with systems software to provide support for next generation applications for big data and analytics and cognitive computing to providing unprecedented insights into opportunities, threats and efficiencies to your organization.

Over the last five years thousands of clients have migrated to IBM Power Systems. Learn how Power Systems has helped them support next generation applications for big data and analytics and cognitive computing on an open platform for choice while improving business performance, reducing risk, and establishing a platform for growth.