News Article
U.S. News & World Report: 5 Warning Signs Your 401(k) Is Being Scammed
By Eric George on Mon, 10/09/2023
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.
News Article
Journal of Cyber Policy: Even Cybersecurity Experts Get Scammed
By John Wilson on Thu, 10/05/2023
Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.
News Article
Digital Journal: Hackers Using Steganography Tactics for Malware Attacks
What is steganography? And how are criminal groups using it to exfiltrate data? Alyn Hockey, VP Product Management, explains all in this Digital Journal article and describes what measures companies can take to plug this vulnerability.
News Article
Keeping Personal Data Secure
With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at Fortra looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from Fortra in 2022.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Guide
Integrating IBM i Security Events into Your SIEM
This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work,...
Guide
Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
...
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Guide
Enterprise Monitoring Success
Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual...
Guide
Build vs. Buy: The Argument Against Developing a Solution for Exit Point Security
Before you commit the resources to develop an in-house solution for exit point security, read our list of issues to consider. You might decide it’s neither easy nor cost-effective to set up and monitor your own in-house solution.
Guide
10 Steps to Streamline the Deployment of Network Monitoring Software for SMBs
10 tips to help small to medium-sized businesses save time during the installation and configuration of network monitoring software.
Guide
Finding Your Way: Mapping Your Network to Improve Manageability
Mapping your network gives engineers and other IT staff a 360-degree view of the entire network. Find out how to use a network map to monitor your network, help with capacity planning, and minimize time spent resolving issues.
Guide
Controlling SQL Updates Using Powertech Exit Point Manager for IBM i
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without...
Guide
Top 8 Reasons SMBs Need to Monitor their Networks
Read the top 8 reasons small-to-medium-sized businesses (SMBs) should implement network monitoring tools.