Q
Manage Learn to apply best practices and optimize your operations.

Purchasing a security package

A customer is looking for a security package that IBM may offer for the iSeries AS/400. Does IBM offer such a package that customers can purchase, or do they have to physically contact a business partner who may deal with third-party security packages?

It's possible that IBM, in a handful of countries, may offer security software packages along with the iSeries. When bundled, they are usually a software package developed by programmers in that country. I can think of a couple of countries that did this a couple of years ago, but I don't know what the current offerings might be. Certainly there are IBM Global Service offerings that sell various security vendors' packages. Which package they sell varies from country to country. In general, however, IBM does not sell a particular security product with the iSeries. So yes, you will have to contact the vendors directly.

==================================
MORE INFORMATION ON THIS TOPIC
==================================

The Best Web Links: Tips, tutorials and more.

Search400.com's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400.com Featured Topic: Secure your iSeries


This was last published in September 2002

Dig Deeper on iSeries system and application security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close