
- #ISERIES FILE MONITOR PCI UPDATE#
- #ISERIES FILE MONITOR PCI SOFTWARE#
- #ISERIES FILE MONITOR PCI SERIES#
29 percent of systems had auditing turned off. Eight percent of user profiles used the default account password. Despite my skepticism when reading any product vendor’s study, some findings should get companies and CSOs moving.įor example, about 10 percent of user profiles had Allobj rights, the equivalent of Window’s Administrator or Unix’s/Linux’s super-user privileges. That’s why the recent report on the state of AS/400 security by the PowerTech Group of Kent, Washington fascinated me. The systems don’t need anything they just keep doing their job, but nobody thought of securing them, and a lot of the security assumptions applied to the systems are 5, 7, even 10 years old.”

People use them because they have core applications that are difficult or too costly to replace. “Many of these systems were first installed in the 1980s and the 1990s. That’s exactly what’s on the mind of Laura Koetzle, vice president at the Forrester Group who covers this market. Pre-TLA/-FLA/-hyphenated-name regulations. We have AS/400s to System I’s used in the 2st century with security models struck in the 1990s. Then IBM introduced a TCP/IP stack for the AS/400, and therein lies the problem. Back then, connected PCs could upload and download files. Talk about legacy systems.īack in the late 1980s you only worried about users at the end of your TWINAX cables, and if the action wasn’t on a green-tube menu, it couldn’t be done. In addition, many of the active-duty machines trace their use as a still-functioning original or as a replacement system to the 1990s. With a rock-solid reputation and entrenched use, these systems don’t get the same attention as machines running more-volatile operating systems such as Windows or Linux. Industry estimates place their total active system number at 400,000. IBM states that over 200,000 systems are updated and/or kept under maintenance contracts. Even several Fortune 100s have a few lurking about. That’s the letter “I” standing for “integrated.” Now client-server and Web applications function are in the systems, and logical partitioning, part of the OS long before virtualization became a buzzword, runs AIX or Linux alongside i5/OS.Ībout 16,000 community banks run core applications on these midframes that are also popular in local and state governments, retailing, distribution, and manufacturing companies.
#ISERIES FILE MONITOR PCI SERIES#
With new models and new processors, in the intervening years the family name changed from AS/400 to iSeries to Series I. Altering a classic joke, you could use any database you wanted as long as it was DB2, which is still integrated into the system today.
#ISERIES FILE MONITOR PCI SOFTWARE#
The “system” included all the hardware and software needed for turnkey operation and had 2,500 business applications available when it first shipped.

IBM introduced the Applications Server/400 in 1988 as the successor to the System/38 and merger point for the System/36.
#ISERIES FILE MONITOR PCI UPDATE#
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model-and a recent study suggests you should pay close attention Why PowerTech Group Wants to Update Your AS/400 Security Model
