Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
Download this guide...
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
If you're a system administrator, technician, or IT manager looking to reduce and simplify your multi-platform monitoring workload, this recorded webinar is for you.
It can be scary stepping out of your comfort zone to manage and take responsibility for new technologies, but it’s also exciting—and increasingly important.
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Halcyon’s Operations Center Suite enabled SunGard Public Sector to use an intuitive tool to automatically handle the vast majority of alerts arising from the monitoring solution, with business-critical alerts sent to a technician trained to immediately deal with systems issues.
BGL Group is one of the UK’s largest personal lines insurance groups. It has over 2,400 employees located at its headquarters in Peterborough and at contact centers in Coventry and Sunderland. The organization serves more than 4.6 million customers through a number of market-leading brands.
The City of Corpus Christi uses Halcyon’s Network Server Suite, a fully integrated solution that manages all network servers and devices from a single console, and Halcyon’s Operations Center Suite, an enterprise console for IBM i centralized monitoring and management, to streamline their department.
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...