PowerSC for IBM AIX

The security, real-time protection, and regulatory compliance solution your critical environments need.

Security in IT systems is now a problem that has two aspects. On the one hand, there is security itself: a single compromised system can cost a company millions of euros and incalculable customers lost not to mention legal problems. On the other hand, due to the various regulations (ISO27001, COBIT, PCI DSS) it is necessary to be able to demonstrate that various security measures are met before regulatory bodies. Failure to comply ranges from fines to possible business shutdown. IBM seeks to address both challenges at once with its IBM PowerSC security solution for its AIX systems.

Secure start

IBM PowerSC takes an innovative approach to system security with its “Trusted Boot” procedures. Most of these types of systems scan for vulnerabilities and malicious code, a process that is necessarily always one step behind threats (many of the “zero day” type) and is therefore inherently vulnerable. IBM PowerSC’s approach is to store a signed and encoded version of each secure system and then look for changes at startup.

Any environment that has been modified is immediately detected by the system and flagged as a potential threat. As an administrator, you’ll get a complete report on the health of your servers, real and virtual, along with a detailed list of any potential issues up to the file system level. In this way, you can easily detect any suspicious origin changes to respond properly and, above all, in time.

Compliance with regulations and regulations

IBM’s PowerSC system also has a number of functions to facilitate compliance with various standards. Constantly monitors your systems and alerts you when a system does not meet the standards, as well as giving you details on how to solve it.

Safe logs and logs

Finally, IBM PowerSC protects against the deliberate manipulation of system logs with your Trusted Logging system. Each system record on each server is copied and sent to a secure location within the VIOS that no one, not even someone like you with super-user privileges, can change or delete. With this, you can be sure that your system logs are always 100 reliable.

© 2022 - SiXe Engineering | Training, consulting, professional services and turnkey projects | IBM, Lenovo, Docker, Red Hat , Tenable, HCL, MEDIGATE, Rapid7, Veeam, Sealpath & SUSE Authorized Business Partner. Company registered in INCIBE's cyber security catalog.
SiXe Ingeniería