Guide
Download "A Guide to Practical Single Sign On"
The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple.
With single sign on (SSO), you can eliminate passwords—and the cost associated with them—by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to achieving the ROI...
Guide
Reevaluating “Evaluating Scalability Parameters: A Fitting End”
In this white paper, the root cause of the deviations from the expected results are explained and an improved scheme is proposed for getting more accurate estimates.
Guide
How to Do Capacity Planning Guide
Your business can’t afford downtime. But with ever-growing IT infrastructure, keeping applications up and running isn’t easy. Every CIO or IT manager has limited time, money, or personnel budget to keep IT running. Without a solution, your IT environment risks performance bottlenecks, outages, and an overall inability to predict future needs.
That’s where capacity planning comes in. Capacity...
Guide
Download "CIO Confidential: 5 Things Your IBM i Security Administrator Should Tell You"
Employees on the front lines often possess insight that manager, directors, and executives lack.
Corporate leaders rely on feedback from these professionals, especially when it comes to emerging security threat. But for a variety of reasons, systems administrators might be reluctant to to speak up about critical issues related to IBM i, including the importance of consistently updating...
Guide
Download "How to Securely Deploy Access Client Solutions (ACS) for IBM i"
IBM i Access Client Solutions (ACS) is the newest member of the IBM i Access family, replacing the IBM i Access for Windows client.
ACS runs on most operating systems supporting Java. Because ACS uses different technology and deployment approach than IBM i Access for Windows, the considerations for securely deploying ACS are different than IBM i Access for Windows.
Some of the...
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in the number of SIEM...
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
Guide
Continuously Optimizing IT in Financial Terms
CHALLENGES: Virtualization and increasingly complex agile computing environments are creating difficulties for IT financial controllers and for IT Financial Management (ITFM).
Virtualization breaks the long-standing direct, one-to-one correlation between cost-allocated physical hardware and the IT services it supports. Increasingly dynamic, multi-layered applications have made it more difficult...
Guide
Download "Childhood's End: Attackers Increasingly Take Aim at Linux Systems"
Like the wide-eyed humans who mistakenly trust their benevolent alien overlords in Arthur C. Clarke’s science-fiction classic, Linux users the world over are beginning to awaken to the reality that their malware- free utopian childhood is rapidly coming to an end.
A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes since 2015 means the...
Guide
Download "IBM i Security and Integrity Monitoring Handbook"
Data breaches increase in number and severity every year. Putting barriers in place to stop attackers is an important part of any data protection plan, but barriers alone aren’t enough.
Today’s top IT profressionals know that verifying the effectiveness of cybersecurity controls is critical. After all, most breaches go months before they’re discovered.
Monitoring your security and regularly...
Guide
The Business Leader’s Handbook for Building an Automation Center of Excellence
Creating an automation center of excellence (COE) ensures that you are automating your enterprise with strategy and vision. This guide gives you the expertise you need to put together a great team, follow best practices, and continually optimize your automation COE.
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
Guide
Download "Why Managed Services Is Becoming IT Security’s Top Trend"
It’s time to reconsider traditional approaches to cybersecurity.
Handling IT security in-house is the norm at most organizations.
But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever.
With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to...
Guide
Download "File Integrity Monitoring for Power Systems Running IBM i"
Data breaches have increased dramatically in the past 10 years. In response, numerous regulatory standards have been created, including the Sarbanes-Oxley Act, HIPAA, and PCI DSS.
These standards require organizations to adopt security best practices. One key best practice is file integrity monitoring (FIM): making sure any changes made to server configurations and critical application data are...