Resources

Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
Article

IBM on IASP for PowerHA Implementations

You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article

FlashCopy: Pros and Cons

IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Article

A Case for PEDM

Learn how one company benefitted from incorporating Core Privileged Access Manager (BoKS), a PEDM solution, into their security portfolio.
Article

Three Signs You’ve Outgrown Password Vaulting

The article highlights the signs to look out for that it’s time to consider add another type of PAM solution—Privilege Elevation and Delegation Management (PEDM)—to help your organization as it continues to grow.
Article

The Lifecycle of a Security Event

This article seeks to illustrate the contrast between stagnant security events at an organization without a SIEM, and the distinct life cycle of events when a SIEM is streamlining security threats.
Article

The Six Ws of Granular Access Control

This article takes a closer look at why granular access control is so effective by placing limitations on who can get into your organization’s system, where, when and how they can access it, and what they can do with it.
Article

Eight Steps Toward a Secure Hybrid Cloud Environment

Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Article

With Public Cloud OS Instances Growing, Security Challenges Grow, Too

“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even with newer models for virtualization appearing on...