Achieving a Secure IBM i – A Job That’s Never Finished
Achieving optimal security on the IBM i isn’t so much a destination as it is a journey that’s marked by a continual series of efforts toward improvement. That’s because security is never static: threats are constantly changing, new and expanded compliance regulations are being introduced, and there are new technologies and best practices to consider. On top of everything else, IBM i environments are in a constant state of flux resulting from changing user needs, new workloads, new interfaces to external protocols, and more. This dynamic situation creates numerous concerns for IT staff, security officers, and corporate management.
A recent survey by Syncsort, of organizations running IBM Power Systems, shows the impact that security and compliance have on IT priorities*:
- 45% say the possibility of a security/privacy breach is a top IT concern
- 48% say security is their number one IT initiative over the next 24 months
- 75% say compliance regulations define their organization’s security program
- 33% say the growing complexity of regulations presents a challenge to ensuring security
We’ll also explore the technologies and best practices that can provide much-needed solutions.