Case Study
Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security
A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds across the...
Case Study
Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
Ability to automate ‘what and which’ authentication methods are utilized based on the access request also significantly improves administrator productivity.
Case Study
Top 5 Worldwide Bank Uses Core Privileged Access Manager (BoKS) for Privileged Access Management
Ensuring security and privacy are central to the continued success for one of the largest bank holding company in the United States. With over 13 million individuals and business customers, this full-service banking, brokerage, and investment company understands the importance of protecting customer information.
...
Article
With Public Cloud OS Instances Growing, Security Challenges Grow, Too
Tue, 03/13/2018
“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even...
Article
Perspectives on the Changing Linux Ecosystem
Tue, 03/13/2018
Media
Text
In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem. After much...
Blog
Next Steps for Replacing IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
You know you need to replace IBM Content Manager. But you don’t know where to start…
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
Datasheet
Webdocs
Webdocs helps you streamline your business processes by managing the entire document lifecycle digitally. That makes it easier for everyone at your organization to get the information they need anytime, anywhere (as long as they’re authorized).
Capture Every Document
Automate the document capture process—no matter how you receive documents. With Webdocs, you can go beyond just scanning and...
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
Guide
Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
Download this guide...
Blog
The Three Scariest Things About NOT Going Paperless
By Bill Whalen on Wed, 03/29/2017
Are you afraid of going paperless? Overcome your fear—and learn about the frightening consequences of not going paperless.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
On-Demand Webinar
Getting Started with Document Management: The Right Plan
Getting started with document management doesn’t need to be complicated. Make it easy—watch this on-demand webinar.