Do you need proof your Exit Point software is working?

Or do you need to implement Exit Point software?

By DXR Security, LLC.

Many organizations have implemented exit point software but are wondering whether the rules they’ve implemented are working as they expect. Other organizations have purchased exit point software but have only implemented it in ‘watch mode’ and wonder about the benefits of implementing rules. Finally, some organizations are contemplating a software purchase but aren’t sure it’s worth the time and effort and need proof of the benefits prior to purchasing. Regardless of which situation you find yourself in, Penetration Testing for IBM i can help answer your question. 

DXR Security’s Penetration Testing for IBM i will provide you with evidence that rules are in place and working – or not. Or show real-world evidence of the benefits of implementing rules and/or the benefits of purchasing and implementing rules. We’ll accomplish this evidence by performing “gray box” pen testing. In other words, we use information about the security configuration of IBM i as well as the configuration of user profiles that represent a cross-section of roles (end-users, operators and programmers, for example) as input to our tests.  Then, we’ll attempt to gain access to and perform tasks on your IBM i – testing many difference aspects of the system – including interfaces that could be protected with exit point software. Penetration Testing for IBM i is a great add-on to network penetration tests which identify open ports and unsecure protocols. DXR Security takes penetration testing to the next level by attempting to run various tasks directly on the system with the intent of accessing application data. Once testing is complete, we’ll provide an easy-to-read report describing the results and provide specific recommendations for hardening security, should any vulnerabilities be identified.

Have questions surrounding exit point software? The results of DXR Security’s Penetration Testing for IBM i could be the evidence you’re looking for.  

Contact DXR Security today to see how pen testing can give you proof your security is working. Or visit https://www.dxrsecurity.com/.

 

JW_DISQUS_VIEW_THE_DISCUSSION_THREAD

Carol Woodbury is President and CTO of DXR Security and has
over 30 years’ experience with IBM i Security. She started her career as Security Team Leader and Chief Engineering Manager for
iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has 
co-founded two companies – SkyView Partners and DXR Security. Her current company – DXR Security – specializes in
penetration testing for IBM i. Her practical experience together with her intimate
knowledge of the system combine for a unique viewpoint and experience 
level that cannot be matched.

Carol is known world-wide as an author and award-winning
speaker on security technology, specializing in IBM i Security topics. She has
written seven books on IBM i Security. Carol has been named an IBM Champion
since 2018 and holds her CISSP and CRISC security certifications.

MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

Created: 2023-02-28 19:01:04

Category: IBM i (OS/400, i5/OS)

Many organizations are under the impression that if they simply configure their end-user profiles to…

Created: 2023-02-13 19:01:04

Category: IBM i (OS/400, i5/OS)

Many organizations which believe that menu-based security is sufficient to protect their IBM i data …

Created: 2023-02-01 01:16:38

Category: IBM i (OS/400, i5/OS)

Carol investigates the use of AI and its implications on IBM i Security
By Carol Woodbury
You can…

Verified by MonsterInsights