Resources

On-Demand Webinar

How to Avoid IFS Security Mistakes

In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked , including one that allows the IFS to spread malware throughout your environment.
Article

I Have All Object Authority And I’m Not Afraid To Use It!

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Product Video

Watch a Demo of Event Manager

Separate the critical events from the noise with security information and event management. Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
Case Study

SQL SCHEDULING GOES ENTERPRISE

Company Background Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study

SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS

Company Background SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people. The company’s products are widely distributed through...
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
On-Demand Webinar

Powertech Event Manager Feature Tour

Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.