Resources

Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Article

Stay on Top of Security with Security Scan

Security and compliance adherence has elevated in criticality over the past few years and has now taken its rightful place as a primary IT initiative, alongside virtualization and disaster preparedness. The necessity for better data protection has landed front-and-center in the public eye following some of the largest data breaches on record.
Article

The Road To Security Starts with a Security Scan

Sometimes, there are known vulnerabilities that clearly need to be mitigated as soon as possible—such as application users running with *ALLOBJ special authority. But, often there isn’t a thorough understanding of what’s wrong with a server’s configuration or what should be addressed first.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar

Audit and Control of Powerful Users on IBM i

Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
On-Demand Webinar

Cutting Through IBM i Security Confusion

In this on-demand webinar, a security expert answers questions about the most confusing aspects of IBM i security. Join us for information that's useful for beginners and veterans.
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

10 Ways to Protect IBM i from Cyberattacks

IBM i and other servers are frequent targets of cyberattacks, according to the Data Breach Investigations Report. Watch this 40-minute recorded webinar to learn how to mitigate common threats to your organization’s data.