SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Product Guide
                                      Security Level 40



                                      Are you ready to Lock Down your Security Solution?

                                      For System i, IBM has stated that any value of QSECURITY less than 40 is not
                                      secure. IBM recommends that this setting should be at level 40 or higher
    Feel Secure with                  because there are several well-known exposures at security level 30.
   Clear Technologies
  Your Trusted IT Advisor

                                                       Out of the 197 systems reviewed,
                                                    32% are at system security level 30 or less.


 Benefits
 • Obtain additional                     Clear Solution
   integrity protection               The Clear Technologies services team will:
   without affecting system           • Enable the Security Audit Journal on your System i if it is not already active.
   performance                        • Analyze the Security Audit Journal to determine if applications are
                                        compatible with security level 40.
 • Plug level 10, 20, and 30          • Deliver a report that lists any application programs that have integrity
   security holes                       exposures that would fail at security level 40.
                                      • Offer assistance to correct applications that are identified to have
                                        integrity exposures.
                                      • Change the QSECURITY system value to level 40 and restart (IPL) the System i.
                                      • Provide support after the security is increased to security level 40.
                                      • Be available to assist with any issues that are found as a result of changing
                                        to security level 40.




                                         Our Story
                                      Since 1993, our customers have                                           Sec urity
                                      relied on us to meet their hardware                                             De
                                      needs. Today, our customers look to                                  s               si
                                                                                                      es
                                                                                    ion




                                      us to increase their organizational
                                                                                                                           gn

                                                                                                                                  Co
                                                                                                 s
                                                                               V irtu aliz at

                                                                                                As




                                      effectiveness by providing
                                                                                                                                     n tin uit y




     For more information on
                                      continuity, infrastructure, security,
   Clear Technologies and our         and virtualization solutions.
      Security Solutions visit
                                                                                                                                 t




www.ClearTechnologies.net/SecLvl40
                                                                                                                                en
                                                                                                Ma




       or call 972.906.7500
                                                                                                  ag
                                                                                                                           em




                                                                                                                            pl
                                                                                                  n




                                                                                                    e
                                                                                                an                     Im
                                                                                                                                   e
                                                                                      Fin




                                                                                                                               ct
                                                                                                                                 ur




                                                                                                  cin
                                                                                                     g                     stru
                                 TM
                                                                                                                      Infra
                                 MT




                                       www.ClearTechnologies.net/SecLvl40

Mais conteúdo relacionado

Mais de Clear Technologies

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideClear Technologies
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalClear Technologies
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 FrontClear Technologies
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™Clear Technologies
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™Clear Technologies
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™Clear Technologies
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product GuideClear Technologies
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleClear Technologies
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsClear Technologies
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetClear Technologies
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Clear Technologies
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim SheltonClear Technologies
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureClear Technologies
 

Mais de Clear Technologies (15)

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product Guide
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of Colleyville
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The Future
 

Security level 40 product guide final

  • 1. Product Guide Security Level 40 Are you ready to Lock Down your Security Solution? For System i, IBM has stated that any value of QSECURITY less than 40 is not secure. IBM recommends that this setting should be at level 40 or higher Feel Secure with because there are several well-known exposures at security level 30. Clear Technologies Your Trusted IT Advisor Out of the 197 systems reviewed, 32% are at system security level 30 or less. Benefits • Obtain additional Clear Solution integrity protection The Clear Technologies services team will: without affecting system • Enable the Security Audit Journal on your System i if it is not already active. performance • Analyze the Security Audit Journal to determine if applications are compatible with security level 40. • Plug level 10, 20, and 30 • Deliver a report that lists any application programs that have integrity security holes exposures that would fail at security level 40. • Offer assistance to correct applications that are identified to have integrity exposures. • Change the QSECURITY system value to level 40 and restart (IPL) the System i. • Provide support after the security is increased to security level 40. • Be available to assist with any issues that are found as a result of changing to security level 40. Our Story Since 1993, our customers have Sec urity relied on us to meet their hardware De needs. Today, our customers look to s si es ion us to increase their organizational gn Co s V irtu aliz at As effectiveness by providing n tin uit y For more information on continuity, infrastructure, security, Clear Technologies and our and virtualization solutions. Security Solutions visit t www.ClearTechnologies.net/SecLvl40 en Ma or call 972.906.7500 ag em pl n e an Im e Fin ct ur cin g stru TM Infra MT www.ClearTechnologies.net/SecLvl40