Blog
What's the Difference Between a Profile Swap and Adopted Authority?
Mon, 01/16/2017
Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority—have been assigned. In many cases, the excess capabilities can simply be removed because they aren't required for the person to perform their job functions.
*SAVSYS special authority is a good example. Unless...
Blog
5 Practical Ways to Use the Audit Journal to Solve Your Administration Woes
Thu, 12/01/2016
The IBM i Audit Journal contains a wealth of information yet remains a mystery to those who can use it most. Fortra security expert describes practical ways that security and system administrators can use this information to help them in their daily jobs.
Blog
Take an IBM i Security Quiz
Tue, 11/01/2016
Take your IBM i security knowledge to the next level with this quiz.
Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog
What’s New in IBM i 7.2?
By Tom Huntington on Tue, 08/16/2016
May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Blog
Is Your Team A Little Rusty on IBM i Operations?
By Tom Huntington on Mon, 08/15/2016
Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.