QSL Northern Europe | +31 (0)418 66 30 23

Follow Us: social facebook1 social twitter1 social linked in1 social xing1   | de

Security on IBM i

Print

Anonymizing personal data

Posted in Security on IBM i

In the data age, the security of the information system - and in particular of personal data - has a huge impact on the confidence of consumers, whether they are  individuals or professionals, and on the image or even the performance of the company.

Print

IBM i version 7.3: what's new at security level?

Posted in Security on IBM i

In version 7.3, launched last April, IBM i is experiencing two major security evolutions:

  • optimizing the traceability of network connections
  • tracking user rights allocation mechanisms.

They are reflected in two new functions, respectively called "Audit of Socket Connections" and "Authority Collection", whose mission is to improve traceability, a strategic challenge in the face of regulatory pressures, and to grant "necessary" rights to users. Lets focus on these two key features of IBM i 7.3 security by Dominique GAYTE from NoToS, a specialist in security auditing in the IBM i environment.