• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Adding Depth To Your IBM i Security Bench

    June 28, 2021 Bill Hammond

    Carol Woodbury of DXR Security is fond of saying that the IBM i platform is “securable” but not necessarily always secure, and the difference between the two is what people do and don’t do to actually use security tools. But there is more to security than the IBM i operating system and its system software.

    As Woodbury will explain in a webcast being hosted on June 30, the most effective approach to cybersecurity is having multiple layers of defense mechanisms deployed to protect your systems. This is commonly referred to as “Defense in Depth.”

    Because your IBM i platform holds data that is vital to your business, implementing multiple IBM i technologies that will help prevent or detect an accidental error or malicious behavior is essential.

    So watch our webcast, where Woodbury will discuss three of the current real-world issues facing organizations today and how layering multiple security technologies can protect your data and avoid business disruptions.

    Register to hear about:

    • The benefits of implementing defense in depth.
    • Determining the value and risk level of your data.
    • Developing a plan to implement as many layers as needed to appropriately reduce risk.

    The webcast will go live on Wednesday, June 30 at noon Eastern. You can register at this link. We hope that you will.

    This content was sponsored by Precisely.

    Bill Hammond is product marketing director at Precisely. Bill has over 25 years of product marketing and product management experience with enterprise software products. He has been responsible for the messaging, positioning and launching of products in a broad range of disciplines from business intelligence to eDiscovery to storage management. At Precisely, Bill covers the IBM infrastructure products which includes the Assure product family for IBM i and the Syncsort family of IBM mainframe solutions.

    RELATED STORIES

    Taking A Centralized Approach To IBM i Security

    Controlling IBM i Access With Exit Points

    Strengthen IBM i Password Security With Multi-Factor Authentication

    Can You Build Data Integrity Without Securing IBM i Systems?

    A Conversation With Carol Woodbury on IBM i Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: DXR Security, IBM i, Precisely

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Join us for this webinar where we’ll showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM i Business Bucks The COVID Trend, Will Says New Converged Archive System, Power Gear Withdrawals

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 43

This Issue Sponsored By

  • Fresche Solutions
  • UCG Technologies
  • Comarch
  • Eradani
  • Precisely

Table of Contents

  • In Search Of Next Gen IBM i Apps
  • Final RPG & DB2 Summit Scheduled
  • Guru: Understanding Database Performance Using The Performance Data Investigator, Part 2
  • New Converged Archive System, Power Gear Withdrawals
  • Adding Depth To Your IBM i Security Bench

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle