Adam Strange illustrates the pitfalls of information security architecture and explains how shifting to data-centric strategies will protect data at file level throughout its entire life cycle.
Data Classification solutions help companies understand and manage their data, however, in this era of regulatory obligation, a "one-size-fits-all" solution doesn’t provide the granularity or flexibility needed to remain compliant.
India’s data privacy regulations are currently undergoing an overhaul. A new law, the Personal Data Protection (PDP) Bill, has been proposed and is likely to be phased in shortly. What does this mean for organizations in India?
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
GlobalSCAPE, a Fortra company, has successfully completed the SOC 2 (System and Organization Controls) audit assessment for its cloud-managed file transfer (MFT) solution, EFT Arcus.
DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.