For the past three years, Syncsort has annually surveyed IT professionals who were responsible for IBM i security at their companies. We asked these pros about their top challenges, strategies, technologies and best practices. While some of the answers were expected, there were some surprises too.
One thing that wasn’t a surprise was to see that the "growing complexity of regulations" was the most selected security challenge for the year ahead. However, there was a significant drop from last year in the percentage of respondents expressing confidence in their IBM i security program to prevent breaches.
View this webinar on-demand where we discuss these survey results which provide a revealing look at the current state of IBM i security.
Hear from Syncsort's security experts to learn what the survey revealed about:
• Top security priorities and challenges for 2020
• Insights into the frequency and focus of audits, as well as data breach detection and impact
• Initiatives for strengthening security and achieving compliance in 2020
Axa Assurance Maroc - Insurer Innovation Award 2024
Taking the Pulse of IBM i Security for 2020
1. Taking the Pulse of IT Security for 2020:
Results from Syncsort’s Security Survey
Bill Hammond – Senior Product Marketing Manager
Rich Marko – Professional Services Director
Dawn Winston – Product Marketing Director
1
2. Housekeeping
Webcast Audio
• Today’s webcast audio is streamed through your computer speakers.
• If you need technical assistance with the web interface or audio, please
reach out to us using the Q&A box.
Questions Welcome
• Submit your questions at any time during the presentation using the Q&A
box.
• We will answer them during our Q&A session following the presentation.
Recording and slides
• This webcast is being recorded. You will receive an email following the
webcast with a link to download both the recording and the slides.
3. Topics
• Technologies installed
• Procurements planned
• Compliance regulations
• Audits
• Breaches
Respondent Profiles
• Responsibility for IBM i security
• 48% have primary responsibility for IBM i security
• 52% share responsibility
• Company Size
• 78% work in companies of more than 100 employees,
• 57% work in companies with more than 500 employees
• Industries
• 10% work for Healthcare companies,
• 10% for Financial Services
• 10% for Computer Services
• 9% for Banking
IBM i Security Insights for 2020
4. IBM i Security Insights for 2020 Survey
• Security was the most-selected priority
• Second year in a row that security was named
the top IT priority of organizations.
• Not surprising given the compliance challenges
10. Regulatory Requirements
80% of our survey respondents required to comply
with one or more regulations
Nearly 90% of respondents reported having sensitive
data on their IBM i servers
• 48% of respondents cited corporate financial
reports
• 39% said they have business strategy information,
• 38% have financial transaction records
17. Future Investment
• Investment will be balanced across many
options
• Artificial intelligence and machine learning was
the top item for investment
• Security Information and Event Management
(SIEM) solutions will be key to AI investment
• Encryption was a top choice for future
investments
19. Assure Security
Assure
Data Privacy
Assure Encryption
Assure Secure File
Transfer
Assure Monitoring
and Reporting
Assure Db2 Data
Monitor
Assure
Access Control
Assure System Access
Manager
Assure Elevated
Authority Manager
Assure Multi-Factor
Authentication
Security Risk
Assessment
Choose the full product
Choose a feature bundle
Or select a specific capability
Assure Compliance
Monitoring
Assure Security
strengthens IBM i
security and assures
regulatory compliance
20
20. Register for Your Free Assessment
Assure Security Risk Assessment provides a useful and
informative picture of your IBM i security:
• Checks dozens of security definitions on your IBM i
• Compares actual values against recommended best
practice
• Tags results with three simple severities – OK,
Warning, or High Risk
• Explains the meaning and significance of system
definitions
• Delivers easy guidance on reducing cyber security
risks
• Provides a high-level management summary of
security risks
https://www.syncsort.com/en/products/assure/security-risk-assessment
21. Flexible services offerings for security
• Quick start services
• Quick check services
• Encrypt While Active
• Security update services (installing hot fixes, PTFs, new releases, etc.)
• System update services (ensuring security solution is properly configured
after system changes to IP addresses, OS versions, etc.)
• Auditor assist (supporting internal or external auditors)
• Security risk assessment
• Managed security services
• A la carte consulting
Leverage Syncsort’s team of seasoned security experts!
Global Professional Services
Add Value to Your Investment
22
22. 23
Learn More
About the layers of security by visiting
the Syncsort website Download Syncsort’s eBook
“IBM i Security Insights for 2020”
https://www.syncsort.com/en/products/assure-security