It's impossible to use an Internet-connected computer today without being surrounded by threats from viruses, hackers, and malicious code. But exactly which areas of the infrastructure are at risk is an oft-debated topic. Protection on client PCs only is not sufficient to keep your network free from malicious code. Your midrange servers must also be protected.
For some time now IBM has been making the AS/400 family more powerful and versatile. With the introduction of Power Systems, the promise of one box that can meet the demands of modern computing environments across multiple operating systems truly came of age. But with this incredible versatility comes increased exposure to threats from malicious code.
Not so long ago, viruses were just one of those little annoyances that come along with using a computer. But over the past few years, those pesky little pieces of code have steadily moved from simple pranks to tools for real criminals. And just as in the physical world, the key to a truly secure system and network is a multifaceted, layered approach.
In Chinese philosophy, balance is achieved between yin—the sustaining principal—and yang—the creative principal. When it comes to System i messaging, the same balance can enhance your operations and bring success and prosperity to your organization.
There are criminals who want our names, our social security numbers, and our financial information; and government agencies and educational institutions are a ripe target. Regulations demand that preventative action be taken, but for the highest level of protection, you must understand the interrelationship of all connected systems..
These days, high availability is a hot topic and you strive to ensure that your system and data are always accessible. After all, the success of your organization depends on it. When it comes to high availability, it's all about eliminating single points of failure. Find out how GSM/SMS technology can help you reduce the number of potential failures you may face.
IBM has made operations management much easier by allowing System i to run multiple operating systems, including Linux and AIX, in partitions alongside i5/OS on the same machine. And although this can make operating your business much easier, it also opens a door for malicious code to find its way onto your server and then flow throughout your network.
A great deal is riding on the effectiveness of your anti-virus protection. While free or inexpensive anti-virus may seem like an adequate solution, it is not. There are real dangers to using open source solutions, and the protection they provide is of little benefit—not much better than taking no steps at all. Here, we look at the realities of open source anti-virus.
It's no secret that vendors sometimes play around with i5/OS to achieve functionality beyond that supported by a given release level. But what is less widely understood is that this practice of "patching" programs can introduce instabilities and security exposures to your System i.
Security applications and monitoring/notification applications often come from different vendors, and as a result it is easy to view them as distinct and separate. However, the two go hand in hand, and monitoring/notification products play a significant role in security. Learn how to combine traditional security solutions with automated monitoring/notification
i5/OS may be famous for security, but it doesn't go far enough in protecting your system's data; it doesn't differentiate how the data being accessed can be used. Therefore, it's wise to supplement your security with third-party solutions; and object-based designs offer distinct advantages over transaction-based security.
If Shakespeare were alive today, his outlook on viruses in 2007 might be "once more unto the breach, dear friends." And if this past year is any indication, he'd be right. The malware landscape won't be getting better any time soon. New threats are emerging at breakneck speed, and the potential consequences are alarming.