AIX Security Guide

This book provides system administrators with information about user, group, file, system and network security for the AIX operating system. It is the central reference point for both overview and detailed security information.

Tips on Documenting Your Security and Other IT Processes (link resides outside of

This article provides some tips for documenting processes and will provide some help in passing your next audit. This is the first in a two-part series.

Document Structure for Audits (link resides outside of

Out of standards comes a process that documents the steps a user must go through to get all of the necessary approvals, as well as the steps administrators go through to process the request. An examination of how this document should be structured.

AIX 5L Version 5.2 Security Supplement

This Redbook provides additional detailed information about virtual private networks (VPN), Kerberos security, the use of secure remote commands (RCMDS) and pluggable authentication modules (PAM), as well as examples of how to restrict users.

pSeries Security - Building on Strength (link resides outside of

Read this article for an overview of the major elements of AIX security.

Get the latest version of OpenSSH for AIX

Why use OpenSSH? When you're running over insecure public networks like the Internet, you can use the SSH command suite instead of the insecure commands telnet, ftp and r-commands.

Introduction to Security in a CSM 1.3 for AIX 5L Environment

This IBM Redbook contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2, including a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software.

Is Your AIX Environment Secure?

This article addresses common security problems in UNIX environments.

OpenSSH is now bundled with AIX

OpenSSH is a free software tool that supports SSH1 and SSH2 protocols. Now it's easy to get OpenSSH already compiled and ready to install on AIX.

Additional AIX Security Tools on IBM eServer™ pSeries, IBM RS/6000 and SP/Cluster

This Redbook describes additional tools and techniques you can use to enhance the security of your pSeries environment.

Contact an IBM Sales Specialist

Browse Power Systems

Next generation applications for big data and analytics and cognitive computing are providing unprecedented insights into opportunities, threats and efficiencies. IBM Power Systems is at the forefront of delivering solutions to gain faster insights from analyzing both structured information and unstructured big data. With the secure, flexible and open platform of IBM Power Systems plus solutions and software, organizations can outpace their competitors by delivering faster services, providing differentiated offerings and turning operational cost into investment opportunity.

To draw insights and make better decisions, businesses rely on the secure, flexible and open platform of IBM Power Systems. Built with the first processor designed for big data workloads, the design of Power Systems combines the computing power, memory bandwidth and I/O in ways that are easier to consume and manage, building on strong resiliency, availability and security.

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

Transform your business with Systems Software that enables virtualization, high availability, flexibility, security and compliance on Power Systems™. IBM’s integrated approach to developing Systems and Systems Software together delivers optimized results with Power Systems.

As an open innovation platform, Power Systems is optimized for big data and analytics performance and to deliver scale-out economics and security for the cloud. IBM and IBM Business Partner solutions exploit key capabilities in IBM Power Systems.

Over the last five years thousands of clients have migrated to IBM Power Systems for choice and flexibility. Learn how Power Systems has helped them revolutionise the way IT is developed and delivered, optimise for big data and analytics, and support private, public and hybrid offerings for scale-out or scale-up implementations all while improving business performance, reducing risk, and establishing a platform for growth.