The IBM i platform provides comprehensive solution capabilities for a highly secure system environment. Sophisticated technologies combine to minimize the potential risk posed by security threats, while better enabling you to rapidly adapt and respond to changing security policy requirements.
Over the last two decades the IBM i platform has built its reputation as a secure system. For companies that rely on IBM i for operations, it may come as a surprise that most of what is needed to comply technologically is already sitting in their computer rooms. The IBM i operating system comes equipped with tools for securing, monitoring, and logging built right in.
IBM i provides excellent object level security features to control access to resources--who can read a particular file, for example. These security features are built into every IBM i system, whether you use them or not.
IBM i can provide field-level security as well. You may need tools to supplement the built-in IBM i security, such as restricting access during certain time periods, or allowing users to read a particular file but not to download it. Take the time to learn what you have, and how it can be used for your organization.
Also provided with IBM i are excellent logging facilities to track the activity occurring on the system–The Security Audit journal, the System History Log, Message Queues, and Journals, just to name a few. Many activities are automatically logged, such as when particular users sign on and off, and you can enable additional logging for many other types of activities as well. These logs provide a detailed accountability to what is occurring on the IBM i system. These logs can be monitored proactively to identify potential problems, or post-mortem to trace a particular problem.
Lastly, in the area of monitoring, the IBM i system provides good tools for keeping tabs on the health and status of your system--including security related events. IBM i Navigator can monitor messages and logs for specific events and notify an administrator when a particular condition occurs. Depending on your needs, you may want to supplement the IBM i monitoring tools to provide additional features, such as problem escalation, or scheduling of specific types of alerts to different groups of people.
Browse Power Systems
IBM i security
IBM i is considered one of the most secure systems in the industry. Read more about the security features, Business Partner security solutions for IBM i, and exciting recent enhancements in security.