Join our live webinar on June 18th to learn why Sequel Data Warehouse is the trusted tool for IBM i organizations to overcome the many types of data integration challenges.
How important is a zero-trust approach to ensuring effective cybersecurity in the work-from-anywhere era? Steph Charbonneau answers the editor’s question in Intelligent CISO.
Consumer privacy legislation is a critical foundation in protecting the rights of consumers and ensuring their safety and privacy online. Many countries around the world have already adopted comprehensive legal protections for personal data.
Adam Strange illustrates the pitfalls of information security architecture and explains how shifting to data-centric strategies will protect data at file level throughout its entire life cycle.
Data Classification solutions help companies understand and manage their data, however, in this era of regulatory obligation, a "one-size-fits-all" solution doesn’t provide the granularity or flexibility needed to remain compliant.
India’s data privacy regulations are currently undergoing an overhaul. A new law, the Personal Data Protection (PDP) Bill, has been proposed and is likely to be phased in shortly. What does this mean for organizations in India?
Alaska Communications is an internet service provider (ISP) supporting communications infrastructure in Alaska. Their team provides critical network services to customers—oftentimes, in remote locations. The company was in the midst of developing plans for a new site—one which was located on a mountaintop. With this remote site, they knew they were in for an uphill battle regarding maintenance and...
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
The recently acquired Halcyon Software solutions reduce the complexity and cost of monitoring, automating, and reporting on core applications and processes on IBM i, AIX, Linux, and Windows servers.
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.