Comparing Different Methods for Calculating Health and Risk
By Per Bauer on Fri, 02/08/2019
How do you calculate IT health and risk? There are different methods you can use, depending on your needs. The most common methods for determining IT infrastructure health are: Threshold comparison Enhanced threshold comparison Event detection Variation from normal Allocation comparison Queuing theory for health On the other hand, the most common methods for calculating IT infrastructure risk are...
Powertech Antivirus and ClamAV: A Detection Rate Comparison
By Bob Erdman on Sat, 12/15/2018
Read on to find out the results of a detection rate test between our enterprise solution, Powertech Antivirus, and the most widely used open source Linux antivirus, ClamAV.
If it has moving parts, someday it's going to fail.
Check out IBM's new READ INTENSIVE SSDs. This is a note to highlight some of the pros and cons - and dig a little deeper into one of the cons - of IBM's recently announced new class of solid state disk drives, "read intensive" (RI) SSDs. The new RI-SSD comes in one flavor, a 1.86 TB drive. The new concept to wrap your head around is that the drive will "wear out" if you write too much over the...
Three Signs You’ve Outgrown Password Vaulting
The article highlights the signs to look out for that it’s time to consider add another type of PAM solution—Privilege Elevation and Delegation Management (PEDM)—to help your organization as it continues to grow.
Different Paths, Same Goal: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM)
PASM and PEDM are two categories of security tools that have distinct approaches in how they manage access. Read on to find out the different approaches PASM and PEDM take to protecting your data, and how they can work together to maximize your security.
The Lifecycle of a Security Event
This article seeks to illustrate the contrast between stagnant security events at an organization without a SIEM, and the distinct life cycle of events when a SIEM is streamlining security threats.
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
The Six Ws of Granular Access Control
This article takes a closer look at why granular access control is so effective by placing limitations on who can get into your organization’s system, where, when and how they can access it, and what they can do with it.
How to Download an ODBC Driver
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
FAQs about Performance Navigator
Will this product hurt the performance of my IBM i®? You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service. How is Performance Navigator compared to PM? Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
Eight Steps Toward a Secure Hybrid Cloud Environment
Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.