Security / Compliance/Privacy

TechTip: IBM i Audit Readiness—User Profile Cleanup PDF Print E-mail
Security - Compliance / Privacy
Written by Barbara Sims   
Friday, 05 August 2016 00:00

Having proper policies and procedures in place is the key to maintaining user profiles.

Written by Barbara Sims

An audit of your IBM i security can be stressful—people coming in and looking at your policies and procedures for how you maintain the security on your system. This doesn’t need to be a time of anxiety. I actually love being audited. Or as I call it “Audit Season.” Not only am I able to show off how well my system is being secured, but I try to impart a little knowledge to the auditor on how IBM i security works its magic. Since I’m probably in the minority for liking audits, let’s discuss one thing that can be done to make your audit a little easier.

Add a comment
Last Updated on Wednesday, 03 August 2016 14:18
Partner TechTip: More Compliance, Better Security, Less Work! PDF Print E-mail
Security - Compliance / Privacy
Written by Robin Tatam   
Friday, 02 October 2015 01:00

Empower IBM i to conduct its own compliance verification and enforcement.

robin tatamWritten by Robin Tatam

IT professionals often complain about the burden of managing security and maintaining compliance. As an added challenge, IBM i staff typically lack formal (or even informal) training in these disciplines. Risk is elevated when organizations ignore the reality that most Power servers operate without adequate security controls.

Add a comment
Last Updated on Thursday, 01 October 2015 16:39
Data Masking and Assuring Security During Software Testing PDF Print E-mail
Security - Compliance / Privacy
Written by Green Light Technology   
Monday, 06 July 2015 01:00

Your production data could be more exposed than you think during software testing.

Written by Green Light Technology

Editor's note: This article introduces the white paper "A Road Map to Successful Data Masking," which is available free from the MC White Paper Center.


Data masking during software testing (or otherwise) is not the simple process that the uninitiated might suppose. Gone are the days when replacing personally identifiable information with random characters makes the grade. Obfuscating data for use in development, testing, and QA environments means you need to be able to quickly provide teams with secure sets of consistent, meaningful data that can be used again and again. But this can be difficult to achieve, particularly in geographically dispersed organizations, and especially if you don't adopt a systematic, centralized approach to de-identifying sensitive data.

Add a comment
Last Updated on Thursday, 02 July 2015 10:50
PCI and the IBM i: If You're Not Paying Attention, You Should Be PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 09 February 2015 01:00

Does your company accept credit-card payments? If so, you're responsible for Payment Card Industry (PCI) mandates.

ira chandlerWritten by Ira Chandler

Just because you run the world's most secure and reliable computing platform (the IBM i, System i, iSeries, AS/400), you're not exempt from the requirements of the international security council that dictates merchant security. Although the many best practices we employ on the IBM midrange platform generally keep the system out of the news, you still must be compliant with the industry standards.


We will refrain from listing the recent data breaches, knowing that you're aware of the risk you take when you store cardholder data. So, in this short article, we will address the following questions:

Add a comment
Last Updated on Friday, 06 February 2015 14:30
Start Thinking About Security in New Ways PDF Print E-mail
Security - Compliance / Privacy
Written by Carol Woodbury   
Friday, 23 January 2015 01:00

Are you heads down, focused on the tasks in front of you? If so, you may be missing something. In this article, Carol discusses the need to stop, take time, and see if you need to think about things differently.

carol woodburyWritten by Carol Woodbury

At this time of year, I try to get away for a few days to relax and stop thinking about work. I've found that when I'm constantly heads down on work, I don't pick up on things around me that have changed. I tend to always do things the same way, but when I get away I may realize there's an easier or better way to do something. If I don't take a break, I'm unlikely to realize what I'm missing—as in new topics that I should be paying attention to or researching or new business opportunities that are right in front of my face but I couldn't "see" because I was too busy with other things. In this article, I'll encourage you to step back from your normal routine and see what you might be missing.

Add a comment
Last Updated on Friday, 23 January 2015 10:53
Are You Meeting the PCI DSS Security Standards? PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 14 April 2014 01:00

Don’t take the requirements lightly; the cost of non-compliance could be very steep.

ira chandlerWritten by Ira Chandler

Acceptance of debit and credit cards is a growing requirement for businesses of all sizes. Since 2005, the Payment Card Industry Security Standards Council (PCI) has imposed strict mandates, the Data Security Standards (DSS), to ensure the security of the computer systems that process, transmit, and/or store sensitive credit card data.

Add a comment
Last Updated on Friday, 11 April 2014 12:42
IBM i Security Administrators' Guide PDF Print E-mail
Security - Compliance / Privacy
Written by SkyView Partners, Inc.   
Monday, 24 March 2014 01:00

Security is no longer something you can put off until tomorrow.

Written by SkyView Partners

Editor's note: This article introduces the "IBM i Security Administrators' Guide" available free from the MC White Paper Center.


Carol Woodbury, president and co-founder of SkyView Partners, Inc., takes her years of experience and knowledge as the IBM i security expert and explains the processes that should be established and checks that should be made by every IBM i security administrator.

Add a comment
Last Updated on Friday, 21 March 2014 11:39
Technology Focus: Are You Ready for Your Next Audit? PDF Print E-mail
Security - Compliance / Privacy
Written by John Ghrist   
Monday, 20 January 2014 01:00

Unless maintaining compliance is a year-round effort in your enterprise, the answer to this question is very likely an emphatic "no!"

john gristWritten by John Ghrist

It's not often that we get to see a trendy new term enter the lexicon while being consciously aware it's happening. However, the recent holiday season may have given us that experience. Perhaps it's too early to tell for sure, but recent events should give additional meaningin the compliance market segment at leastto the term "You've been 'Targeted.' "

Add a comment
Last Updated on Tuesday, 04 February 2014 13:42
<< Start < Prev 1 2 3 4 5 6 7 8 9 Next > End >>

Page 1 of 9



See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:


  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 


Watch the Webinar Now!



MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.