Press Release
New GoAnywhere Release Automates and Secures File Transfers in Cloud and Private Networks
Linoma Software, a Fortra company, today announced the release of version 5.5 of its GoAnywhere managed file transfer (MFT) solution, which allows organizations to deploy MFT agents across the enterprise to automate, secure and audit all of their file transfers from a single, centralized location.
Guide
Download "New York's Cybersecurity Regulation: How It Affects IT Professionals Everywhere"
New York’s new cybersecurity law will affect organizations across the U.S.
And its stringent requirements set a high standard for cybersecurity and data protection.
In this guide, you’ll learn how this law reaches organizations beyond New York’s borders and why many other states are expected to follow suit.
The guide features an easy-to-follow breakdown of the law’s most important requirements...
Quote
Request a Powertech Multi-Factor Authentication for IBM i Quote
Powertech Multi-Factor Authentication for IBM i gives you the power protect access to your IBM i data and comply with stringent regulations. Powertech Multi-Factor Authentication for IBM i simplifies identity and access mangement, allowing you to secure your system without burdening your IT staff through centralized administration and an intuitive self-service portal. To estimate the cost of...
Powertech Multi-Factor Authentication
Simple access authentication for servers inside and outside your firewall
Article
Generate and Distribute Audit Reports Automatically
By Robin Tatam on Mon, 04/03/2017
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
eBay Breach Highlights the Value of Monitoring Security-Related Events
By Robin Tatam on Fri, 03/24/2017
The importance of monitoring your computer system and personal information simply cannot be overstated. In today's online environment, hackers hungry for users' account information and other sensitive details seem to be lurking around every corner. To keep these attackers at bay, companies must always have an eye on system and account activity, and be able to react quickly should anything...
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Blog
Single Sign-On and the Dangers of Active Directory
By Robin Tatam on Fri, 03/24/2017
Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.
Article
Audit Tested & Audit Approved Instant Authority!
By Robin Tatam on Fri, 03/24/2017
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Thu, 03/23/2017
Now more than ever, securing your infrastructure is critical to the success of your organization.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog
IBM i: The Backbone of the Banking Industry
Tue, 03/21/2017
Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
On-Demand Webinar
10 Tips for AIX Security
By Robin Tatam
Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Blog
2 Ways Encryption Protects You Even After a Data Breach
Fri, 03/17/2017
The growing threats to data highlight the need for multiple layers of defense. Encryption is a critical layer that protects your organization from some of the most devastating consequences of a data breach.
Article
New Approaches to the SWIFT and PCI-DSS Framework
Mon, 03/13/2017
THE WORLD OF COMPLIANCE
At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate...
Powertech Encryption for IBM i
Protect sensitive IBM i data with encryption, key management, and auditing