Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Identity Access Management (IAM): I just read a recent article about IAM projects, and the level of complication that can ensue when trying to plan and implement a project of the scale and scope that a comprehensive IAM project entails. The theme of the article is that AD (Active Directory), in many enterprises, is the identity store of choice; the idea being that if you could align your enterprise to use a single account, there is an economy of scale, reducing the number of places where access and permissions would need to be managed.
Compliance Assessment 3.0 identifies IBM i system security vulnerabilities by analyzing user security and password policy settings and scanning for anti-virus software.
Powertech releases new version of their Powertech Identity Manager for IBM i user profile management tool. Identity Manager streamlines onboarding new users and auditing profile settings.
Network Security 6.50 introduces new features that simplify navigation and provide an up-to-the-minute view of transaction metrics.
Director of Security Technologies Robin Tatam will be speaking on the topic of developing secure IBM i applications at the Wisconsin Midrange Computer Professional Association (WMCPA) Technical Conference the afternoon of March 13.
The 2013 findings show that IBM i user provisioning is a significant source of vulnerability.
Robin Tatam, Director of Security Technologies, will share his insight into IBM i security during two educational sessions at COMMON 2014.
Halcyon Software, the global leader in systems management software, today announced an update to Authority Swapper , the access control...
There’s only one conclusion that one can reach after reading PowerTech’s latest security survey: IBM i people just aren’t scared enough.
PowerTech’s State of IBM i Security Study uncovers flawed system settings that leave data vulnerable.
New tool enables organizations to achieve higher levels of compliance when conforming to global regulatory requirements.
Network Security 7.0 helps IT professionals centralize the security management of multiple systems across your network, making it simpler than ever to control and monitor access to critical data.
Powertech has probably done more than any other IBM i vendor to pop the bubble that so many organizations live in when it comes to security on the platform.
IBM i security expert Robin Tatam has earned CISM certification, demonstrating his understanding of how information security relates to business goals.
Robin Tatam, the Director of Security Technologies for PowerTech, will reveal the latest results from a decade of ongoing research into the security configuration of IBM Power Systems servers at the platform's largest user conference.
Policy Minder is a new security administration and reporting solution for the Linux, AIX, and IBM i platforms.