IBM’s new Power servers, based on POWER6 technology, include tools needed to create a secure IT environment. File systems and data are protected, whether they are AIX, Linux, or IBM i (formerly i5/OS) operating environments.
Both AIX and IBM i operating systems feature integrated support for user access controls of security applications helping to manage growth & complexity. Advanced features include authentication, accountability, administration and encryption across the Power system, to enable the intuitive setting of system-wide security policies that can control access on a user-by-user basis.
With IBM Power servers, the administration associated with setting up, monitoring, enforcing and reporting on security status for audit requirements is simplified and automated to reduce the overhead associated with security tasks, freeing valuable IT staff to focus on business growth & innovation.