Aplica el enfoque Zero Trust en Power Systems con PowerSC

Your AIX, LInux and IBM i systems will be secure thanks to this advanced IBM native solution for Power Systems that we have successfully implemented in dozens of customers.

powersc ibm power aix linux ibmi

Security in IT systems is now a problem that has two aspects. On the one hand, there is security itself: a single compromised system can cost a company millions of euros and incalculable customers lost not to mention legal problems. On the other hand, due to the various regulations (ISO27001, COBIT, PCI DSS) it is necessary to be able to demonstrate that various security measures are met before regulatory bodies. Failure to comply ranges from fines to possible business shutdown. IBM seeks to address both challenges at once with its IBM PowerSC security solution for its AIX, Linux and IBM i systems.

Multi-factor authentication (MFA) and more

IBM® PowerSC. It is the security and compliance solution optimized for virtualized environments on IBM Power servers running AIX®, IBM i or Linux with several features that we believe are very relevant.

  • Preventive, real-time monitoring of the environment’s security, including vulnerability alerts, update facilities, user activity monitoring and risk prevention due to changes in system configurations or malicious code.
  • Automation of log review, helping to identify important security events hidden in operating system and application logs and ignoring relatively unimportant events
  • Possibility of adding a two-factor authentication (MFA) with support for different verification mechanisms such as SecurID, TOTP, YubiKey, etc.

Compliance with standards and regulations with PowerSC

IBM’s PowerSC system also has a number of functions to facilitate compliance with various standards. Constantly monitors your systems and alerts you when a system does not meet the standards, as well as giving you details on how to solve it.

Protection against ransomware. Ensuring secure system startup

IBM PowerSC takes an innovative approach to system security with its “Trusted Boot” procedures. Most of these types of systems scan for vulnerabilities and malicious code, a process that is necessarily always one step behind threats (many of the “zero day” type) and is therefore inherently vulnerable. The IBM PowerSC approach stores a signed and encrypted version of each secure system and then detects any suspicious changes during startup.

If the environment has been modified, it is immediately detected by the system and marked as a potential threat. As an administrator, you’ll get a complete report on the health of your servers, real and virtual, along with a detailed list of any potential issues up to the file system level. In this way, you can easily detect any suspicious origin changes to respond properly and, above all, in time.

Logs and evidence safe

IBM PowerSC protects against deliberate manipulation of system logs with its Trusted Logging system. Every system log on every server is copied and sent to a secure location within VIOS that no one, not even someone like you with super-user privileges, can change or delete. With this, you can be sure that your system logs are always 100 reliable.

Simple upgrades

Patch management: PowerSC allows administrators to centrally install and manage security patches and software updates. This ensures that the system is always protected with the latest security updates.

Alerts and notifications

PowerSC can send alerts and notifications to administrators when their attention is required, such as when security patches or critical updates need to be applied. This allows administrators to keep the system up to date and protected.

© 2023 - SiXe Engineering | Training, consulting, professional services and turnkey projects | IBM, Lenovo, Docker, Red Hat , Tenable, HCL, Nozomi, MEDIGATE, Rapid7, Veeam, Sealpath & SUSE Authorized Business Partner. Company registered in INCIBE's cyber security catalog.
SiXe Ingeniería