Aplica el enfoque Zero Trust en Power Systems con PowerSC
Your AIX, LInux and IBM i systems will be secure thanks to this advanced IBM native solution for Power Systems that we have successfully implemented in dozens of customers.
Security in IT systems is now a problem that has two aspects. On the one hand, there is security itself: a single compromised system can cost a company millions of euros and incalculable customers lost not to mention legal problems. On the other hand, due to the various regulations (ISO27001, COBIT, PCI DSS) it is necessary to be able to demonstrate that various security measures are met before regulatory bodies. Failure to comply ranges from fines to possible business shutdown. IBM seeks to address both challenges at once with its IBM PowerSC security solution for its AIX, Linux and IBM i systems.
Multi-factor authentication (MFA) and more
IBM® PowerSC. It is the security and compliance solution optimized for virtualized environments on IBM Power servers running AIX®, IBM i or Linux with several features that we believe are very relevant.
- Preventive, real-time monitoring of the environment’s security, including vulnerability alerts, update facilities, user activity monitoring and risk prevention due to changes in system configurations or malicious code.
- Automation of log review, helping to identify important security events hidden in operating system and application logs and ignoring relatively unimportant events
- Possibility of adding a two-factor authentication (MFA) with support for different verification mechanisms such as SecurID, TOTP, YubiKey, etc.
Compliance with standards and regulations with PowerSC
IBM’s PowerSC system also has a number of functions to facilitate compliance with various standards. Constantly monitors your systems and alerts you when a system does not meet the standards, as well as giving you details on how to solve it.
Protection against ransomware. Ensuring secure system startup
IBM PowerSC takes an innovative approach to system security with its “Trusted Boot” procedures. Most of these types of systems scan for vulnerabilities and malicious code, a process that is necessarily always one step behind threats (many of the “zero day” type) and is therefore inherently vulnerable. The IBM PowerSC approach stores a signed and encrypted version of each secure system and then detects any suspicious changes during startup.
If the environment has been modified, it is immediately detected by the system and marked as a potential threat. As an administrator, you’ll get a complete report on the health of your servers, real and virtual, along with a detailed list of any potential issues up to the file system level. In this way, you can easily detect any suspicious origin changes to respond properly and, above all, in time.
Logs and evidence safe
IBM PowerSC protects against deliberate manipulation of system logs with its Trusted Logging system. Every system log on every server is copied and sent to a secure location within VIOS that no one, not even someone like you with super-user privileges, can change or delete. With this, you can be sure that your system logs are always 100 reliable.
Patch management: PowerSC allows administrators to centrally install and manage security patches and software updates. This ensures that the system is always protected with the latest security updates.
Alerts and notifications
PowerSC can send alerts and notifications to administrators when their attention is required, such as when security patches or critical updates need to be applied. This allows administrators to keep the system up to date and protected.