MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

October 17, 2014 | Volume 11 Issue 41  

ISSUE HIGHLIGHTS

TOP STORY: Who's More Dangerous? The Person You Know or the Person You Don't Know?
ADVERTORIAL: Partner TechTip: File Monitoring and Other Features of Robot SCHEDULE 12
NEWS HIGHLIGHT: HelpSystems Announces Performance and Detection Enhancements in New Version of Anti-Virus Software
TRIAL SOFTWARE: ACO MONITOR manages your IBM i 24-hours a day and notifies you immediately when your IBM i needs assistance!
MC VIDEO PORTAL: Security Admin Tasks - Examining the audit journal
MC INDUSTRY BLOGS: Why Network Security 6.50?
EVENT: IBM i (iSeries AS/400) Expanded Operations Workshop

 

Sponsor - The MC Press Bookstore
 

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Read More >>

Feature Article - Security
 
Who's More Dangerous? The Person You Know or the Person You Don't Know?

While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.

carol woodburyWritten by Carol Woodbury

I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sourcesthat is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topiccentered around the internal threat (breaches and incidents originating from within the organization)also provoked some interesting discussions. This month's article focuses on the internal threat and what the data doesand doesn'tshow. Here's what I learned.


Read More >>

Sponsor - The MC Press Bookstore
 

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


Read More >>

Advertorial - HelpSystems
 
Partner TechTip: File Monitoring and Other Features of Robot SCHEDULE 12

Let's say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!

ChuckLosinski 116x116Written by Chuck Losinski

Version 12 of Robot SCHEDULE contains some helpful new features that will improve your processes and add value for your business. Perhaps the most important of these features are the new event monitors that can be set up to monitor file activity, allowing Robot SCHEDULE to react to file and directory events happening on IBM i.


Read More >>

MC Video Portal
 

MC Video Portal

Security Admin Tasks - Examining the audit journal

In this informative video:  Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.


Read More >>

MC Software Center
 

ACO MONITOR manages your IBM i 24-hours a day and notifies you immediately when your IBM i needs assistance!

More than a paging system - ACO MONITOR™ is a complete systems management solution for your Power Systems running IBM i. Managing the complexities of today's operating systems, business applications, and networks challenges even the most knowledgeable IT professionals. The cost to an enterprise of unplanned downtime, loss of human expertise during sick leave or vacation, and system/application or environmental failure can be devastating. ACO MONITOR manages your Power System 24/7, uses advanced technology (like two-way messaging) to notify on-duty support personnel, and responds to complex problems before they reach critical status.

 

ACO MONITOR is proven technology and is capable of processing thousands of mission-critical events daily. The software is pre-configured, easy to install, scalable, and greatly improves data center (and staff) efficiency.

 

The following trial software can also be found at the MC Press Software Center.

 

ACOM’s iSeries-native forms output software, now with new GUI-based tool 

Auditing Tool with Built-in Reports for SOX, PCI Compliance 

Backup and Recovery on IBM i: Your Strategy for the Unexpected 

Control and Monitor User Access from Desktop PCs (ODBC, FTP)

Easiest Way to Save Money? Stop Printing IBM i Reports 

Electronic Forms: Free Trial Software – No Obligation

Free Trial of INPRO's TimeZoNe/400 (TimeZoNe Simulation Utility)

Free Trial of Linoma's Field and Backup Encryption Software Crypto Complete

Free Trial of Linoma's Managed File Transfer Software GoAnywhere

Hassle-Free IBM i Operations around the Clock 

Manage IBM i Messages by Exception with Robot

Query, Reporting & Analytics for IBM i: Free Trial 

Real-Time Message Monitoring and Notification for IBM i

Real-Time Performance Monitoring and Reporting for IBM i

Report Distribution: Free Trial Software – No Obligation

Test-drive ACOM’s iSeries-native electronic payment software 

Try the Most Powerful Anti-Virus Protection for IBM i for Free! 

Try the one package that solves all your document design and printing challenges on all your platforms

*ALLOBJ and not afraid to use it? Privileged user management is here

 

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card

 

Have Trial Software you would like to list? Click here or call (208) 726-6822 for information.

 


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Industry Blogs

Read and Share the latest from the IBM i Security Blog

brought to you by PowerTech

Why Network Security 6.50?

Posted on September 23, 2014 by Robin Tatum – Director of Security Technologies/PowerTech

 

Users neglected the security void created by TCP/IP services for years, but exit programs can provide the robust solution today's threat environment demands.


Read More >>
   MC-STORE.COM