IBM i Security Audit Solutions

It is very common for people to leave a company or change roles within the company. Often this is overlooked and access note revoked to applications and functions which are no longer needed. This is very important with high authority users which are authorised to operating system level tasks and application tasks specifically related to finance processes.  Potentially leading to failed compliance audits or potential fraud.

Therefore it is very important to undertake security audits on a regular basis.

At IMS we offer security audit solutions that are specific to IBM i/AS400 environments, reviewing your requirements from both an IBM i (OS400) perspective and application level security (with system 21/Aurora)

  • Review & implement required changes to IBM i security policy
  • Review & implement changes to System 21/Aurora policy
  • Role processing
  • Tasks
  • Menus
  • Workspace security
  • Help identify users profile authorities/tasks/including application level

Often IBM i systems are totally independent of the clients normal server/pc based network. At IMS we can help integrate the security of internet facing environments.  More so with the specific requirements for securing the IBM i and the issues associated with having and IBM i system visible over the internet.

As a company we understand both the network security and also the IBM i specifics which are not often considered when the systems are up as for internet facing (online trading, payment system systems and customer portals). IMS are uniquely placed as a company who understand security appliances such as Cisco ASA, Watchguard. So can advise and assist with the setup and vulnerability of these appliances.

With all the current high profile security breaches.  Perhaps it’s time to review your IBM i security and associated infrastructure.

It makes sense to have a partner who understands all related aspects (IBM i, Network security and application level security system21/Aurora). IMS are such a partner.

We offer both ad-hoc security audits or individually customised support contracts which handle period system security audits.