During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
This webinar provides an overview of Intermapper Flows, the integrated network bandwidth monitoring tool within Intermapper that provides you with real-time information on the full activity of your network.
Before you commit the resources to develop an in-house solution for exit point security, read our list of issues to consider. You might decide it’s neither easy nor cost-effective to set up and monitor your own in-house solution.
High availability solutions are seen as expensive, time consuming, and tricky. So, even though HA tops IT wish lists, many companies pump the brakes and make excuses to delay implementation. We’re here to clear the air for HA.
What roadblocks have prevented you from taking on a high availability project? Don’t let budget or resources be your excuse for putting off HA one more day. Learn how you can achieve HA with ease.
Intermapper Flows is a particularly valuable tool for monitoring network traffic as it gives you detailed metrics about who, how, and when data is flowing across the network.
Get a complete overview of the benefits and features of Intermapper Flows, a NetFlow analyzer that works helps you identify bandwidth hogs and traffic congestion.
High availability is a buyer’s world. With so many different solutions on the market, you shouldn’t be shy about shopping around until you find the right fit. Follow these tips for selecting your HA solution.
Intermapper 6.1 makes detecting new devices easier, more accurate, and faster than ever. Get a full review of Intermapper 6.1’s features and how to try them out.
IBM i high availability has been at the top of your wish list for a while. Don’t let budget hold you back any longer. Discover how affordable HA can be.
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without any control by the...
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.