About PowerTech iSeries security experts PowerTech is your security expert for managing compliance and information security threats on Power Systems servers (iSeries, AS/400, IBM i).

From compliance assessments and training to exclusive research and committed product development, PowerTech backs its modular, customizable solutions with the knowledge you need to secure your most sensitive information and comply with SOX, PCI, HIPAA, and more.

Learn more at
www.helpsystems.com/PowerTech

Download the iSeries Security Study
Complete the form to download
'The State of IBM i Security Study 2014'




We value your privacy. We will not rent or sell your email address.

TODAY'S IBM i SECURITY


Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2014 State of IBM i Security Study analyzed 233 servers.

Now in its 11thyear, the study provides compelling insight into security weaknesses affecting many IBM i systems. Some of the most dangerous defects include:

  • Unmonitored network access
  • Lax system auditing
  • Dangerous default security settings

The alarming results show improperly configured servers, including one system that experienced more than two million sign-on attempts against a single profile.

Is your system vulnerable? Get the study to find out.




iSeries Security Tips for Data Access

Poor Profile Management



Inactive profiles represent an easily exploited way to compromise your system. Our analysis revealed:

  • An average of 240 profiles had not signed on in the past 30 days
  • 140 of these inactive profiles remained enabled and ready for use

User security is the front line in network protection. Without it, other efforts to secure your IBM i system are largely ineffective.

iSeries Security Tips for Special Authorities

Unrestricted Access



Exit programs are essential for monitoring and restricting network access, but our results show major gaps in coverage:

  • Only 34% of systems studied had any exit programs in place
  • Of those, only 6% of systems used the requisite number of exit programs

Without the protection exit programs provide, users have almost unlimited access to critical data.



Download the IBM i security study
Complete the form to download 'The State of IBM i Security Study 2014'

We value your privacy.
We will not rent or sell your email address.