IBM i – i5/OS – OS/400 Security

With a team of experienced Power System and IBM i consultants, Maple can provide consultancy for all aspects of security on the IBM i / i5/OS / OS/400 operating system, including:

  • Security policy design and implementation encompassing user profiles, group profiles, application ownership, authorisation lists, library and object authorities
  • Security controls development and testing, to ensure your security policy is operating as it should be and keeping your data secured
  • Security management software selection, installation and configuration

In addition, for end-point security on the IBM i environment, Maple can provide Fortress/400, a unique product designed to enhance IBM i security in a networked environment. Fortress/400 provides the necessary additional security features to control the incoming remote requests received by IBM i / i5/OS / OS/400. It provides a great opportunity to tighten your internal and external network security and to stop your authorized users performing “unauthorized” functions. By capturing incoming requests from clients attempting to access server functions, Fortress/400 enhances your security and creates an audit trail of all remote requests received.