While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.
Written by Carol Woodbury
I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sources—that is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topic—centered around the internal threat (breaches and incidents originating from within the organization)—also provoked some interesting discussions. This month's article focuses on the internal threat and what the data does—and doesn't—show. Here's what I learned.
System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.
Let's say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!
Written by Chuck Losinski
Version 12 of Robot SCHEDULE contains some helpful new features that will improve your processes and add value for your business. Perhaps the most important of these features are the new event monitors that can be set up to monitor file activity, allowing Robot SCHEDULE to react to file and directory events happening on IBM i.
Security Admin Tasks - Examining the audit journal
In this informative video:Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.
More than a paging system - ACO MONITOR™ is a complete systems management solution for your Power Systems running IBM i. Managing the complexities of today's operating systems, business applications, and networks challenges even the most knowledgeable IT professionals. The cost to an enterprise of unplanned downtime, loss of human expertise during sick leave or vacation, and system/application or environmental failure can be devastating. ACO MONITOR manages your Power System 24/7, uses advanced technology (like two-way messaging) to notify on-duty support personnel, and responds to complex problems before they reach critical status.
ACO MONITOR is proven technology and is capable of processing thousands of mission-critical events daily. The software is pre-configured, easy to install, scalable, and greatly improves data center (and staff) efficiency.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice.We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card
Have Trial Software you would like to list? Click here or call (208) 726-6822 for information.