The i/OS operating system is known to be very secure and to date has not been infected by a virus. It has always been stated that the most likely risk a business has is from the internal user community so a business should never be complacent.
Telnet and FTP both have security implications and we would recommend that these communication methods are secured. Applied Technologies are able to deploy SSL and SSH solutions which enables client authentication. With client authentication, the server ensures that the client certificate is valid and that it is signed by a Certificate Authority that the server trusts. These solutions can be deployed to authenticate IBM HTTP Server, FTP Server, Telnet Server and LDAP Server.
What makes this such an excellent solution is that it is also free.
Portable Utilities for i5/OS (IBM i 5733-SC1) is a licensed program offering (LPO) that is available forIBM i i users. The 5733-SC1 LPO contains the OpenSSH, OpenSSL, and zlib open source packages ported to IBM i using the i5/OS PASE runtime environment. The 5733-SC1 LPO requires that IBM i V5R3 or later and IBM i option 33 (i5/OS PASE) be installed. For more information refer to 9.13.1, “Portable Utilities for i5/OS” on page 208.
OpenSSL
OpenSSL is an open source software that provides a full-featured SSL implementation by implementing SSL V3 and TLS V1. You use OpenSSL to create the environment that is needed to run SSL-enabled applications. As OpenSSL is available on many platforms, this is one of the reasons why programmers, who write applications that use SSL/TLS sockets, use OpenSSL. The advantage is that they can use a single program source and run it on various platforms, as opposed to using vendor-specific SSL implementations.
OpenSSH
OpenSSH is an open source software that provides a secure shell and secure tunnelling service to protect data traffic over an untrusted network. It provides secure alternatives for Telnet and FTP. It verifies the authenticity of both the client and server, and all of the data (including user IDs and passwords) is encrypted as it travels in the network. This encryption is done transparently to the end user.
With a simple deployment method, it is possible to deploy a POC for both solutions within 1 day.
If you would like to discuss this in more detail please contact sales@applied-tech.co.uk
Request a callback
Recent article:
Riverbed – FREE Proof of Concept
Riverbed’s WAN Optimisation products improve and accelerate application performance, allowing a distributed workforce to collaborate in real-time. But don’t take our word for it. Arrange a free proof of concept today to see the dramatic improvements possible. With LAN-like access to data and applications, Riverbed’s SteelHead will optimise your infrastructure and streamline your operations, all whilst […]
Recent article:
Oracle licensing tactics – be warned!!
A couple of interesting articles from Computer Weekly highlighting how Oracle’s lack of transparency and aggressive sales practices could be costing your company money. Applied Technologies recommend TIBERO as an alternative to Oracle, offering considerably lower licensing and maintenance costs. Read this article for more information and to see the Computer Weekly articles.
Recent article:
VDI without the use of a server?
Virtualization of the desktop simplified further with the use of client-side virtualization.




