Why IT Operations and Security Needs to Include Mainframe and IBM i Systems Log Data
Decades ago, IT systems were self-contained. In an era ruled by mainframe computers, top to bottom programs all ran within a single environment and were written in a single programming language. Applications ran in relative isolation. Inputs and outputs were limited to so-called “human interfaces” (that is, keyboards and screens), supported by hard-copy printouts and […]
Why Mainframes are Secure (And How to Make Them Even More Secure)
Mainframes are arguably the most secure computing platform available today. That does not mean, however, that there are not extra steps that you can take to add even more security to your mainframe. What makes your mainframe inherently secure, and what can you do to make it even more secure? Keep reading for an overview […]
Using Exit Points to Fortify Your IBM i Security
In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the case with today’s IBM i environments. Fully open to communicate with other systems across internal and external networks, and accessible […]