Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Fortra today announced the winners of its inaugural Top Partner Awards. These prestigious accolades acknowledge the dedication and remarkable growth of companies that strive to further the Fortra brand in key markets around the globe.
TERMS OF AGREEMENT. Vendor (“Vendor”) shall perform the services and/or provide the goods to Fortra, LLC, and/or one or more of its subsidiary and affiliated entities (collectively, “Fortra”) in accordance with the purchase order issued by Fortra to Vendor for such purchase (the “PO”), including these terms and conditions (the "PO Terms"). Vendor agrees to these PO Terms upon the earlier of: (i)...
Fortra announced today it has acquired the Core Security assets from SecureAuth. The assets acquired from SecureAuth are industry-leading solutions for identity governance and administration, penetration testing, threat detection, and vulnerability management.
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down with IT Jungle at the recent COMMON PowerUp conference to talk about what’s new.
HelpSystems didn’t have a single major product launch at the COMMON...
Change is the only constant for IT pros. We know your initiatives are always changing. Some are done in days, others may take months or even years before you can cross them off your to-do list.
Whether you’re focused on shoring up security, automating mundane processes, accessing better business insight, or filling a knowledge gap, it never hurts to ask for a little help.
That’s where a Tech...