• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Trinity Guard Launches Third IBM i Product

    March 27, 2019 Alex Woodie

    Three is the magic number for Trinity Guard, the Houston, Texas-based security software company that just delivered its third security product for IBM i. TGDetect is a monitoring tool that alerts administrators of security issues, and also integrates with third-party SIEM solutions.

    Trinity Guard was founded several years by two former Micro Focus employees, Tony Perera and Pauline Ayala, who trace their roots back to the Pentasafe and NetIQ days. Perera and Ayala left Micro Focus to develop IBM i security software at Trinity Guard. The company has been slowly rewriting the old Pentasafe products, starting with TGAudit.

    TGAudit was based in part on the old PS-Audit product from Pentasafe, and provides the capability to audit the security settings of one or more servers. The company’s second product was TGSecure, a network security product that helps secure exit points on IBM i servers. This product was also based in part on an old Pentasafe product, PS-Secure.

    Now with the launch of TGDetect, the triumvirate of old Pentasafe products has been reborn under the Trinity Guard banner.

    “TGDetect is the newest addition and it is the piece that provides security monitoring and alerting,” says Ayala, who is Trinity Guard’s vice president of operations. “With this product release, the replacement of the old PentaSafe products is now complete.”

    TGDetect addresses a common problem on the IBM i server: making sense of the huge amount of security data in a timely manner, so that administrators can determine what is acceptable usage versus what’s a sign of malicious activity.

    TGDetect monitors IBM i logs for indications of security policy violations.

    The software monitors all the important sources of security event data, including message queues like QSYSOPR, the QAUDJRN audit journal, and the QHST history file. It also monitors the use of sensitive commands, and is integrated with TGSecurity to receive alerts of attempted violations of exit point policies.

    TGDetect lets users set their own customizable filters to ensure they’re seeing the alerts that are most important to them. Customers can monitor for major events, such as failed sign-on attempts that used powerful user profiles, attempted remote connections, questionable user profile changes, and production library authority issues.

    If the software detects activity that matches a filter, it will send an alert via email immediately. The software also has the capability to escalate critical security events.

    Companies with existing security information and event management (SIEM) implementations can also hook TGDetect as a source for IBM i security events. The software integrates with SIEMs from Splunk, Graylog, ArcSight, QRadar, and the Elasticsearch Stack.

    RELATED STORIES

    Trinity Guard Gives Audit Tool A Friendly GUI

    Trinity Guard Fills Gap In IBM i Network Security

    Trinity Guard Gives PentaSafe Customers a Lifeline

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: ArcSight, Graylog, IBM i, QRadar, Security Information and Event Management, SIEM, Splunk

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    What’s the State of Your Backup? What New Language Will IBM i Support Next?

    Leave a Reply Cancel reply

TFH Volume: 29 Issue: 20

This Issue Sponsored By

  • Fresche Solutions
  • COMMON
  • CNX
  • WorksRight Software
  • Computer Keyes

Table of Contents

  • What New Language Will IBM i Support Next?
  • Trinity Guard Launches Third IBM i Product
  • What’s the State of Your Backup?
  • Four Hundred Monitor, March 27
  • IBM i PTF Guide, Volume 21, Number 12

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9
  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.