Solutions


System management addresses the administration of the IT environment, including the control and operation of the network infrastructure, servers, clients and pervasive devices.

Security Management for pSeries Servers

IBM's integrated security solutions that combine IBM Tivoli® security software with IBM pSeries® servers can help you address the heightened and growing need for a highly secure on demand environment.

AIX 5L Web-based System Manager (WSM) security

Web-based System Manager security is optionally installable software that provides for the secure operation of the Web-based System Manager in client-server mode. It is based on public key cryptography, the SSL (Secure Sockets Layer) protocol and standard AIX log-in security.

Cluster and distributed systems management

  • AIX cluster software documentation

    IBM Cluster Systems Management (CSM) for AIX is designed for simple, low-cost management of distributed and clustered IBM Power Systems in technical and commercial computing environments. CSM allows system administrators and operators to manage distributed Power Systems/AIX servers located in geographically distant data centers. It also provides management of clustered Power Systems/AIX located in the same facility (including hardware control, such as power on and off, of properly configured servers). CSM exploits IBM Reliable Scalable Cluster Technology for AIX. CSM and RSCT product guides contain sections on security within their cluster and systems management domains.

  • IBM Tivoli security management

    IBM Tivoli security management solutions address two critical e-business challenges: automated identity management and security event management. The IBM Tivoli identity management solution helps you quickly realize ROI by bringing users, systems and applications online fast, while effectively managing users, access rights and privacy preferences throughout the identity lifecycle. The IBM Tivoli security event management solution helps you actively monitor, correlate and quickly respond to IT security incidents across your e-business. Securely manage and enable access to your on demand computing resources with Security Management solutions from Tivoli software.

Trusted computing base (TCB)
This commands reference shows how to use the tcbck command to audit the security state of your system.

Related documentation

Introduction to Security in a CSM 1.3 for AIX 5L Environment

This IBM Redbook contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2, including a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software.

Contact IBM

Browse Power Systems

Next generation applications for big data and analytics and cognitive computing are providing unprecedented insights into opportunities, threats and efficiencies. IBM Power Systems is at the forefront of delivering solutions to gain faster insights from analyzing both structured information and unstructured big data. With the secure, flexible and open platform of IBM Power Systems plus solutions and software, organizations can outpace their competitors by delivering faster services, providing differentiated offerings and turning operational cost into investment opportunity.

To draw insights and make better decisions, businesses rely on the secure, flexible and open platform of IBM Power Systems. Built with the first processor designed for big data workloads, the design of Power Systems combines the computing power, memory bandwidth and I/O in ways that are easier to consume and manage, building on strong resiliency, availability and security.

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

Transform your business with Systems Software that enables virtualization, high availability, flexibility, security and compliance on Power Systems™. IBM’s integrated approach to developing Systems and Systems Software together delivers optimized results with Power Systems.

As an open innovation platform, Power Systems is optimized for big data and analytics performance and to deliver scale-out economics and security for the cloud. IBM and IBM Business Partner solutions exploit key capabilities in IBM Power Systems.

Over the last five years thousands of clients have migrated to IBM Power Systems. Learn how Power Systems has helped them support next generation applications for big data and analytics and cognitive computing on an open platform for choice while improving business performance, reducing risk, and establishing a platform for growth.