iTech Solutions - for all of your IBM i System needs

iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on January 23, 2019

Sure you can use ANZDFTPWD (Analyze Default Passwords) to get a list of IBM i users with default passwords. You can also use some simple SQL in conjunction with the USER_INFO IBM i service in QSYS2 to do the same

Posted on December 12, 2018

Just a few more days to shop, to work, and to wait for Christmas. I thought I would share a little story about how iTech Solutions helped Santa prepare for Christmas this year. As many of our readers remember, Santa

6 Steps to Execute an IBM i Security Project
Posted on November 26, 2018

Regulations (FISMA, HIPPA, SOX, and more) are forcing companies to evaluate how they protect their sensitive data. Industries such as finance, insurance, and healthcare have the most pressure to comply with these regulations which are geared towards protecting consumers private information. 

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth

Posted on September 25, 2018

Managing a large and complex server like the IBM i, can be daunting. Add to this the fact that you may have Scaling Up/Down/In/Out, need to control High Availability and Monitoring, Patching, Manage Backups and Restores, you have to ensure

Posted on August 22, 2018

Many companies want to improve the state of their IBM i security, but they often don’t know where to start. They also might not understand the long-term impact of recommended changes. Let’s take a closer look at six steps to properly execute a security improvement project.

Posted on May 23, 2018

DANBURY, CONN. – iTech Solutions announces it has been shortlisted for a prestigious Cyber Security award. The category is for the best “Cyber Awareness Plan of the Year”. The winning plan will be presented to the world’s media at a prestigious black tie event in London on June 21st 2018, sponsored by Cyber Security Awards, a leading awards event for the cyber security industry. The Cyber Security Awards, established in 2014, reward the best individuals, teams and companies within the cyber security industry.