Complete the form to download
'The State of IBM i Security Study 2014'
TODAY'S IBM i SECURITY
Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2014 State of IBM i Security Study analyzed 233 servers.
Now in its 11thyear, the study provides compelling insight into security weaknesses affecting many IBM i systems. Some of the most dangerous defects include:
- Unmonitored network access
- Lax system auditing
- Dangerous default security settings
The alarming results show improperly configured servers, including one system that experienced more than two million sign-on attempts against a single profile.
Is your system vulnerable? Get the study to find out.
Poor Profile Management
Inactive profiles represent an easily exploited way to compromise your system. Our analysis revealed:
- An average of 240 profiles had not signed on in the past 30 days
- 140 of these inactive profiles remained enabled and ready for use
User security is the front line in network protection. Without it, other efforts to secure your IBM i system are largely ineffective.
Exit programs are essential for monitoring and restricting network access, but our results show major gaps in coverage:
- Only 34% of systems studied had any exit programs in place
- Of those, only 6% of systems used the requisite number of exit programs
Without the protection exit programs provide, users have almost unlimited access to critical data.
Complete the form to download 'The State of IBM i Security Study 2014'