• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Taking A Defense In Depth Strategy With IBM i

    June 21, 2021 Bill Hammond

    The most effective approach to cybersecurity is having multiple layers of defense mechanisms deployed to protect your systems. This is commonly referred to as “Defense in Depth.”

    Because your IBM i platform holds data that is vital to your business, implementing multiple IBM i technologies that will help prevent or detect an accidental error or malicious behavior is essential.

    Watch our webcast where Carol Woodbury of DXR Security will discuss three of the current real-world issues facing organizations today and how layering multiple security technologies can protect your data and avoid business disruptions.

    Register to hear about:

    • The benefits of implementing defense in depth.
    • Determining the value and risk level of your data.
    • Developing a plan to implement as many layers as needed to appropriately reduce risk.

    The webcast will go live on Wednesday, June 30 at noon Eastern. You can register at this link. We hope that you will.

    This content was sponsored by Precisely.

    Bill Hammond is product marketing director at Precisely. Bill has over 25 years of product marketing and product management experience with enterprise software products. He has been responsible for the messaging, positioning and launching of products in a broad range of disciplines from business intelligence to eDiscovery to storage management. At Precisely, Bill covers the IBM infrastructure products which includes the Assure product family for IBM i and the Syncsort family of IBM mainframe solutions.

    RELATED STORIES

    Taking A Centralized Approach To IBM i Security

    Controlling IBM i Access With Exit Points

    Strengthen IBM i Password Security With Multi-Factor Authentication

    Can You Build Data Integrity Without Securing IBM i Systems?

    A Conversation With Carol Woodbury on IBM i Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: IBM i, Precisely

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Get A Move On To Learn More About Moving To Git Source Control On IBM i IBM i PTF Guide, Volume 23, Number 25

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 42

This Issue Sponsored By

  • Maxava
  • UCG Technologies
  • Profound Logic
  • Entrepid
  • Raz-Lee Security
  • Precisely
  • ARCAD Software

Table of Contents

  • IBM i Business Bucks The COVID Trend, Will Says
  • Don’t Forget About The Co-Lo Alternative To Cloud
  • Guru: Understanding Database Performance Using The Performance Data Investigator, Part 1
  • The Long Play
  • IBM i PTF Guide, Volume 23, Number 25
  • Taking A Defense In Depth Strategy With IBM i
  • Get A Move On To Learn More About Moving To Git Source Control On IBM i

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26
  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.