In the data age, the security of the information system - and in particular of personal data - has a huge impact on the confidence of consumers, whether they are individuals or professionals, and on the image or even the performance of the company.
Security on IBM i
In version 7.3, launched last April, IBM i is experiencing two major security evolutions:
- optimizing the traceability of network connections
- tracking user rights allocation mechanisms.
They are reflected in two new functions, respectively called "Audit of Socket Connections" and "Authority Collection", whose mission is to improve traceability, a strategic challenge in the face of regulatory pressures, and to grant "necessary" rights to users. Lets focus on these two key features of IBM i 7.3 security by Dominique GAYTE from NoToS, a specialist in security auditing in the IBM i environment.
Since the subprime crisis and the revelation of billions of toxic assets, banks are called upon to achieve more stability ( Basel III ) and more solvency ( Solvency II ) insurance. And above all: to more transparency.