Resources

Blog

What is the Value of SIEM?

As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Blog

What to Know about the New NIST Cybersecurity Framework

Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Guide

Protecting Your Data—How Much Security Is Enough?

As organizations become increasingly aware of the need to protect their data, the question that needs to be answered is how much security is enough? Unfortunately, that’s one of those “it depends” questions. Each organization must consider their own requirements before confidently answering that question. This document discusses those considerations.
Case Study

Field-level Encryption Helps Retail Chain Achieve PCI Compliance

Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors. “We need to be able to access credit card...
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world...
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
Article

iSeries Penetration Testing

Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
On-Demand Webinar

What’s New in IBM i Security in V7R3 and V7R2

IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i. Get the details on the new security features.
Guide

Download "How IT Professionals Can Navigate SOX Compliance"

Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge. With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital. This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
Guide

Download "How IT Professionals Can Navigate HIPAA Compliance" Guide

The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge. As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever. This compliance guide breaks down some of the thorniest...
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...