• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Two Weeks Of Webinars On IBM i Security

    August 29, 2022 Timothy Prickett Morgan

    Security through obscurity was never a good OS/400 and IBM i security strategy, even though it was a commonly held belief by many in the base. Over the decades, the interconnected of systems has become more pronounced and security threats in the IT world have ramped up and – there are related, but not exclusively causal, relationships between these two phenomena. Suffice it to say, the need to be more proactive about system and application security has never been greater.

    Well, unless you count next year. And the year after that. And the year after that. . . .

    This situation is only going to keep getting worse, and IT shops have no choice but to fight back.

    But when it comes to IBM i security, it is safe to say that many IBM i shops are in over their heads and they have to get all of the help they can to try to batten down the hatches against the many threats that all systems – even the IBM i platform – can be the victim of these days.

    That’s why IBM i security software vendor Raz-Lee Security has put together a series of webinars in September to help customers get a handle on the big issues they face when it comes to securing their IBM i systems. They are as follows:

    • September 5 – Using MFA to Secure Sign On for IBM i: Learn about the dangers of social engineering and its prevention, including password brute-force attacks and the benefits of enabling Multi-Factor Authentication at IBM i with Raz-Lee iSecurity MFA
    • September 6 – Zero Trust and Encryption at IBM i: What are the core principles of the zero trust model? This discussion will review the stages of implementing zero trust and how data encryption is the first step with the help of Raz-Lee iSecurity Field Encryption & PGP Encryption
    • September 7 – Surviving a Combined Attack: This discussion will review combined attack techniques and ransomware types, but, more importantly, how to stay safe thanks to software like Raz-Lee iSecurity Antivirus & Anti-Ransomware
    • September 12 – Zero Trust and Exit Points at IBM i: Zero trust principles, concepts, and misconceptions; this webinar will get into the detail about exit points of the IBM i and how to fix this security issue with Raz-Lee iSecurity MFA & Firewall.
    • September 13 – Zero-Day Attack Prevention: What is the real meaning of a Zero Day attack? Learn how to be ready for this kind of security breach during this webinar, which will focus on prevention using tools from Raz-Lee Anti-Ransomware + MFA + Firewall, making a Zero Day attack stop as soon as it begins.
    • September 14 – Data Loss Prevention over IBM i: Learn about Data Loss Prevention and how it is related to compliance. This webinar will show you how to enable policies and procedures with Raz-Lee iSecurity Audit.

    You can sign up for any and all of these webinars at this link.

    RELATED STORIES

    Raz-Lee Simulates Ransomware Attack on IBM i

    Raz-Lee Debuts Anti-Ransomware For IBM i

    Assessing The Ransomware Threat On IBM i

    Ransomware Raises The Stakes For Data Insurance

    WannaCry: What IBM i Pros Need To Know

    Assessing The Ransomware Threat On IBM i

    Keeping Ransomware Out of the VAULT

    Top 11 Ways to Protect Your IBM i from Insider Threats

    Verizon Outlines Disturbing AS/400 Breach At Water District

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: IBM i, Raz-Lee Security

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM i PTF Guide, Volume 24, Number 35 Kisco Makes Moves In the IBM i Security Business

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 58

This Issue Sponsored By

  • Maxava
  • FalconStor
  • STRATEGIC
  • Raz-Lee Security
  • WorksRight Software

Table of Contents

  • IBM’s Competitive Analysis For The Power10 Midrange Machine
  • Moving To The Cloud Should Be Easier Than Switching Homes
  • Kisco Makes Moves In the IBM i Security Business
  • Two Weeks Of Webinars On IBM i Security
  • IBM i PTF Guide, Volume 24, Number 35

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Power11 Transistor Count Discrepancies Explained – Sort Of
  • Is Your IBM i HA/DR Actually Tested – Or Just Installed?
  • Big Blue Delivers IBM i Customer Requests In ACS Update
  • New DbToo SDK Hooks RPG And Db2 For i To External Services
  • IBM i PTF Guide, Volume 27, Number 33
  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle