Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 1 - 21 of 472 for
Content types: Article X
Article
By on March 24th, 2017

In our technologically advanced world, few things are scarier than the possibility of devices and systems being hacked by cybercriminals.

Article
By on March 24th, 2017

The importance of monitoring your computer system and personal information simply cannot be overstated. In today's online environment, hackers hungry for users' account information and other sensitive details seem to be lurking around every...

Article
By on March 24th, 2017

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.

Article
By on March 24th, 2017

Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.

Article
By on March 24th, 2017

A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.

Article
By on March 24th, 2017

Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.

Article
By on March 24th, 2017

Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.

Article
By on March 24th, 2017

I recently spoke with a number of attendees at COMMON’s fall conference in Columbus who were facing regulatory mandates including PCI, Sarbanes-Oxley, and HIPAA. For these organizations, tremendous resources are often consumed in order to generate the variety of information deemed necessary to prove compliance.

Article
By on March 24th, 2017

Today, PowerVM is sold with more than 70 percent of Power Systems and supports Linux and AIX systems. Why have the vast majority of Power Systems environments adopted PowerVM? And what are you missing if you’re one of the last 3 in 10 without it?

Article
By on March 23rd, 2017

Now more than ever, securing your infrastructure is critical to the success of your organization.

How network monitoring tools can identify security threats
Article
By on March 22nd, 2017

Need to build better Host Reports with Sequel Data Access? Get our top tips.

Article
By on March 21st, 2017

You need a backup strategy to test your company’s disaster recovery plan and, despite its reputation for reliability, administrators still need to back up their IBM i. A sound backup strategy should also restore individual user objects to account for human error.

Article
By on March 21st, 2017

The prospect of collecting and connecting large amounts of potentially sensitive information sounds like a compliance and security problem waiting to happen. However, big data can also be leveraged to better protect sensitive data and close gaps in the organization’s IT security framework.

Article
By on March 21st, 2017

Do you have what you need to put together the pieces of a data breach? If you’re prepared enough to catch a breach in action, do you know how to find and stop it?

Article
By on March 21st, 2017

Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.

Article
By on March 21st, 2017

Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!

Article
By on March 21st, 2017

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.

Article
By on March 21st, 2017

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.

Article
March 21st, 2017

Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.

Banks depend on AS/400 for security
Article
By on March 21st, 2017

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.

Article
By on March 21st, 2017

While group profiles can make managing authorities more efficient and versatile, inheritance of a group’s private and special authorities can make users far more powerful than their base profiles might suggest. An answer to that weakness can be found in a lesser-known—but arguably more powerful—inheritance technique called profile swap.

Stay up to date on what matters.