- JD Edwards
- IBM i / AS400
A deeper understanding of the risks and the security controls built into the OS is currently driving a wave of interest in prioritizing cybersecurity issues on IBM i....Cybersecurity is becoming a higher priority,” Tatum writes. However, many organizations are still in the early stages of implementing IBM i security controls.
- Robin Tatum, 2020 State of IBM i Security Study.
As an auditor, do you "go beyond the checklist" and make sure that nothing is hidden in the margins and that no code has been temporarily removed, only to be added back in after the auditors place their green check in box?
If you are unsure of how to answer any of these questions, your audit may be at risk.
Don't fall victim to believing that because you have a compliance plan in place, you're covered. You need a full security strategy as well, since compliance mandates typically set only minimum requirements. Reach out to our IBM i security professionals to schedule a pre-Audit IT Risk Assessment which will:
As IBM i /AS400 certified experts, we can work with your team to move beyond the "IT checklist". By having a CISSP specialist review and assess the platform your audit will be more robust.
— Rob Nettgen, CISSP
IBM i Security Specialist, Briteskies
Briteskies was contacted after a client's foreign subsidiary's e-commerce site was breached. Our team worked together with the company to formulate a next step plan for how to avoid future breaches by implementing an infosec governance function within the company. Subsequently, the client created a new position with specific focuses based on Briteskies's advisement.
Hired to perform an IBM i security assessment as part of the client's SOX compliance requirements, Briteskies reviewed the clients infrastructure and found vulnerabilities on the IBM i server which had potential to be exploited to gain unauthorized access. Briteskies recommended additional practices and offered guidance on how the client could improve their security authentication, resulting in an overall increase in IT security awareness and insurance.
After a ransomware infestation encrypted numerous PCs within the company, the client was seeking advice as to how best to secure their point of vulnerability. After performing a full information security review, Briteskies sat down with the staff and offered advice and guidance for what to do and how to do it in order to better secure their system, including what products to use and implement for a more formalized information security policy. Additional resources were provided to their IT staff for future education.
Our annual customer and employee surveys consistently show that we deliver the best experience for both our clients and our fellow team members.
In a recent survey, our team scored 4.5 of 5 on business relationship satisfaction.
Tell others great things about working at Briteskies.
Believe that Briteskies values being a long-term partner.
Would recommend Briteskies to an associate.