• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Carol Woodbury to Speak on Security Layers

    October 1, 2013 Alex Woodie

    It’s common knowledge that a good approach to implement IT security involves building multiple security layers around what you’re trying to protect. But how exactly does one go about doing that? Later this week, SkyView Partners president Carol Woodbury will provide some tips.

    IT security professionals will often talk about implementing multiple levels of defense into security systems. Conceptually, this sounds like a great idea. If one layer of security is compromised, an intruder will still have to hack his way through one or more additional layers of defense to get to the customer master file, financial database, or whatever piece of sensitive data one is trying to protect.

    The process of actually implementing a multi-layer defense system is something else altogether, especially when it involves the IBM i server, which has its own series of peculiarities and (yes) security vulnerabilities.

    The interplay of IBM i security protections and the wider networked world can make for some surprises when implementing a multi-layer security system. Where should the layers of security be placed? And how many does one need?

    Skyview’s Woodbury, a renowned IT security expert and former security architect at IBM for the AS/400 (now IBM i) server, will provide answers to these questions over the Web this Friday at 8 a.m. PDT.

    To sign up for the webinar, titled “Coffee with Carol: Implementing Multiple Layers of Defense,” go to www2.gotomeeting.com/register/184523018.

    RELATED STORIES

    It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says

    SkyView Launches Security Compliance Reporting Service

    SkyView Launches New Auditing Tool

    SkyView Gets Tough on User Profiles

    SkyView Taps New CEO to Ride the Compliance Wave



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Protect Your IBM i and/or AIX Servers with a Free Virus Scan

    Cyber threats are a reality for every platform, including IBM i and AIX servers. No system is immune, and the best defense is prompt detection and removal of viruses to prevent costly damage. Regulatory standards across industries mandate antivirus protection – ensure your systems are compliant and secure.

    Get My Free Virus Scan

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SEA:  absMessage is an all-in-one IBM i message and resource monitoring solution.
    Profound Logic Software:  Try Profound UI FREE for 30 days!
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    New Manta Training Combos Target New IBM i Hires RPG, Database Top Enhancements In IBM i 7.1 Technology Release 7

    Leave a Reply Cancel reply

Volume 13, Number 27 -- October 1, 2013
THIS ISSUE SPONSORED BY:

Maxava
Databorough
Townsend Security
SEA - Software Engineering of America
Cybernetics

Table of Contents

  • looksoftware Updates Server for Web and Mobile Interfaces
  • VAI Delivers One GUI for All Devices with S2K Smart Center
  • FormSprint Delivers Two IBM i-Connected iPad Apps
  • ProData Converts Spool Files to Emails with SPLF2EML
  • inFORM Decisions Gives iDocs a Makeover
  • Silvon Moves More of BI Tool Out Onto the Web
  • RJS Provides IBM i Managed Services, Too
  • Cloud Consultant Program Launched by mrc
  • Carol Woodbury to Speak on Security Layers
  • eConnect Shines a Light on Casino Fraud

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle