5 IBM i Compliance and Security Success Stories
The “Security by Obscurity” Myth
Securing IBM i systems and complying with regulatory requirements at a level aligned with all your other corporate systems is critical. While the IBM i is among the most securable systems available, it is not inherently secure. If not secured at the highest level, it can become the weak link in your security chain, allowing entry into your broader network of systems and data. As for the belief that IBM i enjoys “security by obscurity,” today’s cybervillians and your company’s employees fully understand that IBM i servers hold a wealth of valuable data, including corporate intellectual property, financial transaction information, and sensitive database records for customers, partners and employees.
You need to leverage all of your IBM i system’s powerful security features, wrap layers of security around the OS and its data, and integrate these processes and protocols with those protecting your other systems and networks. Fully and actively securing your IBM i platform is critical to keeping your entire business protected, and is also necessary to achieve and prove regulatory compliance.