• LEAD ARTICLE: Why IBM i Organizations Should Pay Attention to What Happens in New York
• FEATURED ARTICLE: C# for RPGers: Making Stuff Happen, Part 1 - Introducing Flow Control in C#
• NEWS HIGHLIGHT: The Perfect Match, Remain Software and Secure Infrastructure & Services (SIAS) Meet in the Cloud!
• MC PRESS NEW BOOK: Identity Management: A Business Perspective.
• MC WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
• FEATURED VIDEO: Why you should use Watson Natural Language Understanding
• EVENT: Backup and Recovery Considerations for Security Data and Encrypted Back-Ups
Carol discusses how the cybersecurity law in New York will affect organizations running IBM i and how it provides guidance for organizations—even those outside of New York.
Written by Carol Woodbury
The State of New York passed a cybersecurity law that went into effect March 1, 2017. It’s one law in one state. So why should organizations outside of the control of the New York State Department of Finance be concerned about this law? Because it’s yet another indication that governments are getting serious about security.
All Data and Software Resides on the IBM i: Everything is centralized and secure.
Graphical Designer: Design labels in minutes.
Integrate and Print with Existing Apps: Call from RPG, COBOL, CLP and JAVA programs.
Compliance Labels Provided: Extensive library of predesigned label templates.
Supply Chain Solution: Easily integrated into any IBM i ERP or WMS solution.
TL Ashford - Since 1983
Confused About Identity Management? Get expert help in this latest release from MC Press. Author Graham Williamson explains identity management for business people. Business managers and CIOs will learn how to manage today's identity challenges relating to access control, the cloud, consumers, data security, and the Internet of Things. If you are tasked with fitting identity management into your business strategy, then Identity Management: A Business Perspective is the perfect guide for you!
Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!
Now that you know a few things about declaring variables and using methods, let’s see how to make decisions in C#, using logical operators and the IF statement.
Written by Rafael Victória-Pereira
It’s time to move to a new topic: decision making. In order to do that, you’ll need to know how to declare variables and use methods in C#. If you’re not entirely sure how to do that, go back a few TechTips to get comfortable with these things.
Technology advances like cloud, mobile, and Internet of Things have made identity and access management more important than ever, and also more complex. How can business leaders get a handle on their evolving identity needs?
by Anne Grubb
By making identity management a core part of business strategy, says Graham Williamson in his latest book, Identity Management: A Business Perspective. Williamson, a consultant whose expertise includes identity and access management (IAM), has written the book to help senior-level technology managers understand IAM, so they can mitigate risks and implement robust, secure identity strategies in their organizations.
A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:
- Real-time security event logging and monitoring
- Security architecture and logging sources on the IBM i
- Creating the IBM security audit journal QAUDJRN
- Enabling IBM security events through system values
- File integrity monitoring (FIM)
- A step by step checklist begin collecting and monitoring IBM i security logs
Download your copy today from the MC White Paper Center
Plus Choose From The Outstanding Selection in our MC White Paper Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.