Resources

Article

A Case for PEDM

Learn how one company benefitted from incorporating Core Privileged Access Manager (BoKS), a PEDM solution, into their security portfolio.
Article

Three Signs You’ve Outgrown Password Vaulting

The article highlights the signs to look out for that it’s time to consider add another type of PAM solution—Privilege Elevation and Delegation Management (PEDM)—to help your organization as it continues to grow.
On-Demand Webinar

The Effects of Cloud Migration on IAM, PAM, and Audit

With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
Article

The Lifecycle of a Security Event

This article seeks to illustrate the contrast between stagnant security events at an organization without a SIEM, and the distinct life cycle of events when a SIEM is streamlining security threats.
Guide

Choosing the Right SIEM Solution to Face Today's Security Challenges

What Makes a SIEM Solution Effective? SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind. Given the immense benefits and an increase in the number of SIEM...
Blog

SAO vs. SIEM: Not Enemies, But a Security Defending Duo

As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
Article

The Six Ws of Granular Access Control

This article takes a closer look at why granular access control is so effective by placing limitations on who can get into your organization’s system, where, when and how they can access it, and what they can do with it.
Article

How to Download an ODBC Driver

Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article

FAQs about Performance Navigator

Will this product hurt the performance of my IBM i®? You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service. How is Performance Navigator compared to PM? Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i .
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.