Security / Compliance/Privacy


Are You Meeting the PCI DSS Security Standards? PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 14 April 2014 00:00

Don’t take the requirements lightly; the cost of non-compliance could be very steep.

ira chandlerWritten by Ira Chandler

Acceptance of debit and credit cards is a growing requirement for businesses of all sizes. Since 2005, the Payment Card Industry Security Standards Council (PCI) has imposed strict mandates, the Data Security Standards (DSS), to ensure the security of the computer systems that process, transmit, and/or store sensitive credit card data.

Add a comment
Last Updated on Friday, 11 April 2014 11:42
Read more...
 
IBM i Security Administrators' Guide PDF Print E-mail
Security - Compliance / Privacy
Written by SkyView Partners, Inc.   
Monday, 24 March 2014 00:00

Security is no longer something you can put off until tomorrow.

Written by SkyView Partners

Editor's note: This article introduces the "IBM i Security Administrators' Guide" available free from the MC White Paper Center.

 

Carol Woodbury, president and co-founder of SkyView Partners, Inc., takes her years of experience and knowledge as the IBM i security expert and explains the processes that should be established and checks that should be made by every IBM i security administrator.

Add a comment
Last Updated on Friday, 21 March 2014 10:39
Read more...
 
Technology Focus: Are You Ready for Your Next Audit? PDF Print E-mail
Security - Compliance / Privacy
Written by John Ghrist   
Monday, 20 January 2014 00:00

Unless maintaining compliance is a year-round effort in your enterprise, the answer to this question is very likely an emphatic "no!"

john gristWritten by John Ghrist

It's not often that we get to see a trendy new term enter the lexicon while being consciously aware it's happening. However, the recent holiday season may have given us that experience. Perhaps it's too early to tell for sure, but recent events should give additional meaningin the compliance market segment at leastto the term "You've been 'Targeted.' "

Add a comment
Last Updated on Tuesday, 04 February 2014 12:42
Read more...
 
Top Ten Security Considerations for the Cloud PDF Print E-mail
Security - Compliance / Privacy
Written by Carol Woodbury   
Monday, 10 June 2013 00:00

Whether you're using a cloud-based application or moving your whole infrastructure to the cloud, you should consider how this move affects your organization's security and compliance requirements.

carol woodburyWritten by Carol Woodbury

Editor's Note: This article introduces the webcast "Top Ten Security Considerations for the Cloud" available free to view at the MC Webcast Center.

 

Many organizations are moving parts or all of their applications to the cloud. When data is moved to the cloud, who's responsible to ensure all of the security requirements continue to be met? Is the cloud a less secure environment or more secure? Can all of your organization's regulatory and compliance requirements still be met if the data is moved to the cloud? These are the types of questions you'll want to ask prior to moving your applications to the cloud.

Add a comment
Last Updated on Thursday, 06 June 2013 15:08
Read more...
 
Technology Focus: In the Realm of Auditing and Compliance, the Song Remains the Same PDF Print E-mail
Security - Compliance / Privacy
Written by John Ghrist   
Monday, 15 April 2013 00:00

Despite a quality selection of auditing and compliance tools for IBM i, security problems in 2013 are largely "same old, same old."

john gristWritten by John Ghrist

Probably as much as two decades ago, when the IBM i was still the AS/400 and being touted as the most secure computing system in the world (mostly due its magnificent isolation), there were still security problems experts could point to. Primarily these were 1) not enough accountability for changes to databases, 2) too many users holding too-powerful security profiles, and 3) unauthorized users gaining access to systems (e.g., due to weak passwords).

Add a comment

Last Updated on Monday, 15 April 2013 00:00
Read more...
 
User Rating: / 1
PoorBest 
Managing Privileged Users on IBM i PDF Print E-mail
Security - Compliance / Privacy
Written by Robin Tatam   
Monday, 25 March 2013 00:00

Misconceptions are common regarding how users are granted command privileges.

robin tatamWritten by Robin Tatam

Editor's note: This article introduces the white paper "Managing Privileged Users on IBM i," free for download at the MC White Paper Center.

 

For years, analysts have predicted the demise of the platform whose heart beats in the chest of many of the world's largest organizations. But frustrated industry experts reject the notion that IBM i is outdated, citing highly scalable 64-bit Power-PC technology, class-leading reliability, and integrated security. Much of the controversy involves the "green screen," so IBM and many third-party solution providers have sought to provide users with a modern GUI to their IBM i applications.

Add a comment
Last Updated on Friday, 22 March 2013 11:48
Read more...
 
The 12 Sections of PCI DSS and How Each Relates to the IBM i Community PDF Print E-mail
Security - Compliance / Privacy
Written by SkyView Partners, Inc.   
Monday, 25 February 2013 00:00

Carol Woodbury and her team refresh everyone's memory as to what PCI means to the IBM i.

Written by Skyview Partners

Editor's Note: This article is an introduction to the webinar "The 12 Sections of PCI DSS and How Each Relates to the IBM i" available free from the MC Webinar Center.

 

While one may think that the Payment Card Industry (PCI) is a thing of the past and that it's already been implemented, that's not the case. Some retailers are just beginning to understand how PCI applies to them, and other organizations have started to accept credit cards when they didn't in the past. The need to understand compliance with the PCI standard and just exactly what it translates into as far as the IBM i is concerned has left many shops wondering. You see, the PCI standard itself talks about "best practices" and uses very generic language in its descriptions, language that could apply to any computing platform.

Add a comment

Last Updated on Thursday, 21 February 2013 15:55
Read more...
 
PCI DSS Compliance with Managed File Transfer PDF Print E-mail
Security - Compliance / Privacy
Written by Justin Phipps   
Monday, 10 September 2012 00:00

It's imperative that IT professionals become well-versed in all of the PCI DSS regulations.

Written by Linoma Software

Editor's Note: This article introduces the free white paper "PCI DSS Compliance with Managed File Transfer" available from the MC White Paper Center.

 

PCI DSS compliance requirements will continually evolve under the auspices of the PCI Security Standards Council throughout a newly defined 36-month lifecycle. This may mean that the security "tweaks" that IT implements today for PCI DSS 2.0 may be inadequate to handle the data security requirements of the next version of the standard.

Add a comment
Last Updated on Monday, 10 September 2012 09:03
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 Next > End >>

Page 1 of 8

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


   MC-STORE.COM