IBM i Security Services
-
Myths
-
Facts
-
Our IBM i security blog posts
2023.08.22 Technical Details of CVE-2023-30988 - IBM Facsimile Support Privilege Escalation 2023.07.03 Technical Details of CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service 2023.03.30 Booby Trapping IBM i 2023.01.20 Abusing Adopted Authority on IBM i 2022.09.28 Another Tale of IBM i (AS/400) Hacking 2022.09.05 Simple IBM i (AS/400) hacking -
Publicly available IBM i vulnerabilities reported by us
Assessment and Remediation

Penetration testing | iCompliant | ||
---|---|---|---|
star | Objective | identify and exploit vulnerabilities | assess and review the security configurations |
bolt | Automation | manual testing and human-driven analysis | automated process using specialized tools |
assistant_direction | Approach | simulate real-world attacks | comprehensive examination of the system |
monitor_heart | Level of Intrusiveness | intrusive and aggressive testing | non-intrusive |
manage_history | Frequency | periodically or before major system updates | regularly to maintain the security of systems |
frame_inspect | Scope | focuses on specific targets or applications | covers the whole system |
hourglass_bottom | Time and Resources | time-consuming and resource-intensive | quicker and requires fewer resources |
contrast | Testing Methodology | mix of black-box, grey-box testing | white-box audit |
summarize | Report | vulnerabilities, impact, remediation | vulnerabilities, impact, remediation |
payments | Cost | more expensive due to the manual efforts and expertise | often more cost-effective |
Education
-
IBM i training
Our IBM i security trainings are the ultimate resource for proactively securing IBM i systems. Led by experienced instructors with extensive knowledge of IBM i penetration testing, security research, and industry best practices, our trainings are designed to help IT professionals of all levels stay ahead of the curve when it comes to securing critical systems and data.
Our trainings enable security professionals to get up to speed with IBM i and its security features. We introduce the platform through hands-on exercises, and show how exploits are connected to well-known attacker techniques, allowing quick adoption of defensive concepts.
Learn more about our IBM i security training...