On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense. MFA protects you from the most common cause of a data breach: compromised...
On-Demand Webinar
Give Your Organization IBM i Data in a Browser
Find out how to give your organization access to real-time IBM i data no matter where they are.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By Robin Tatam on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
Guide
Essentials for Privileged Access Management
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide
Controlling SSH for Security and Compliance
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Guide
Our Privileged Access Management Solution - Your Sudo Replacement
Learn how to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce administration efforts with an effective privileged access management solution.
Article
Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies
Mon, 03/13/2017
System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article
Managing IT Access Privileges
Mon, 03/13/2017
THE UNSOLVED PROBLEM Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges. The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID badges) that can open many-toall of the locks in the...
Article
Solving Healthcare Security Concerns
Mon, 03/13/2017
According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial fraud, there is also...
Article
New Approaches to the SWIFT and PCI-DSS Framework
Mon, 03/13/2017
THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate incident three years ago (no, you don’t want to hear...
Article
Pros and Cons for Puppet's Configuration Management & Security
Mon, 03/13/2017
THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet in their server/VM infrastructure, and are looking...
Article
How-To: Get Started with Sequel Web Server for Client Tables and More
Wed, 02/22/2017
Learn how to extend Sequel Data Access across your organization with Sequel Web Interface and Sequel Web Server.
On-Demand Webinar
Mark Geery, CIO of Tony’s Fine Foods, Shares Success with Sequel
By Mark Geery
In this session Mark Geery, CIO of Tony’s Fine Foods will discuss how they have used Sequel in their business.
Article
How to Use the SEQUEL ViewPoint Repository to Your Advantage
Mon, 06/27/2016
With the new SEQUEL ViewPoint repository, it’s easier than ever to manage, find, and run your SEQUEL objects. Learn more about the benefits of the repository.