1 assessment comprehensive analysis of ibm i security
DESCRIPTION
3 Objectives Set “baseline” for corporate security policies Check compliance with external regulations & baseline corporate security policy Prioritize security efforts Identify security issues before they occur Deliverables User-friendly HTML report covering network access, system auditing, user management, terminal access, password policy, etc. Assessment recommendations based upon security best practices Sample questions answered Who is using FTP (file transfer) to download files? Which application files are being transmitted via the network? Which system value settings are not in accordance with our site’s policies? How many of our users have non-secure passwords? Which user profiles are not being used and should be disabled? Assessment Objectives & DeliverablesTRANSCRIPT
![Page 1: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/1.jpg)
1
AssessmentComprehensive Analysis of IBM i Security
![Page 2: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/2.jpg)
2
• In-depth analysis of IBM i security strengths and weaknesses• Pinpoints specific issues & areas requiring attention• Summary and detailed reports produced, grading each aspect of
server security• Detailed explanations provided for each item in report• Provides instant benefit to companies by suggesting “best
practices” recommended values
Assessment Features
![Page 3: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/3.jpg)
3
Objectives• Set “baseline” for corporate security policies• Check compliance with external regulations & baseline corporate security policy• Prioritize security efforts• Identify security issues before they occur
Deliverables• User-friendly HTML report covering network access, system auditing, user
management, terminal access, password policy, etc.• Assessment recommendations based upon security best practices • Sample questions answered
• Who is using FTP (file transfer) to download files?• Which application files are being transmitted via the network?• Which system value settings are not in accordance with our site’s policies?• How many of our users have non-secure passwords?• Which user profiles are not being used and should be disabled?
Assessment Objectives & Deliverables
![Page 4: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/4.jpg)
4
Security Assessment Application
![Page 5: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/5.jpg)
5
Security Assessment Report
![Page 6: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/6.jpg)
6
Security Scores and Recommendations
![Page 7: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/7.jpg)
7
Detailed Analysis and Recommendations
![Page 8: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/8.jpg)
8
Analysis of Users Classes
![Page 9: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/9.jpg)
9
Analyzing Users by Privilege
![Page 10: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/10.jpg)
10
User Profiles as security threats
![Page 11: 1 Assessment Comprehensive Analysis of IBM i Security](https://reader035.vdocuments.us/reader035/viewer/2022081513/5a4d1af57f8b9ab059980eb4/html5/thumbnails/11.jpg)
11
Please visit us at www.razlee.com
Thank You !