Bill Hammond is product marketing director at Precisely. Bill has over 25 years of product marketing and product management experience with enterprise software products. He has been responsible for the messaging, positioning and launching of products in a broad range of disciplines from business intelligence to eDiscovery to storage management. At Precisely, Bill covers the IBM infrastructure products which includes the Assure product family for IBM i and the Syncsort family of IBM mainframe solutions.
June 28, 2021 Bill Hammond
Carol Woodbury of DXR Security is fond of saying that the IBM i platform is “securable” but not necessarily always secure, and the difference between the two is what people do and don’t do to actually use security tools. But there is more to security than the IBM i operating system and its system software.
As Woodbury will explain in a webcast being hosted on June 30, the most effective approach to cybersecurity is having multiple layers of defense mechanisms deployed to protect your systems. This is commonly referred to as “Defense in Depth.”
Because your IBM i platform holds …Read more
June 21, 2021 Bill Hammond
The most effective approach to cybersecurity is having multiple layers of defense mechanisms deployed to protect your systems. This is commonly referred to as “Defense in Depth.”
Because your IBM i platform holds data that is vital to your business, implementing multiple IBM i technologies that will help prevent or detect an accidental error or malicious behavior is essential.
Watch our webcast where Carol Woodbury of DXR Security will discuss three of the current real-world issues facing organizations today and how layering multiple security technologies can protect your data and avoid business disruptions.
Register to hear about:
- The benefits of
March 29, 2021 Bill Hammond
Today, the job of managing security on IBM i can be complicated, requiring dynamic technologies and processes that can respond quickly to ever-evolving threats and new regulations. Ransomware and other malware can, and has, infected IBM i systems and effective access control is a major weapon in the battle to secure your IBM i. There are many different approaches and technologies you can use to keep your IBM i secure.
Using the exit points provided by the IBM i operating system can be a powerful tool to monitor and secure four important levels of access within the IBM i:
March 15, 2021 Bill Hammond
As stories of data breaches caused by exploited credentials continue to make headlines, basic password protection mechanisms are no longer good enough. Organizations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.
IBM i systems contain the data that drives your business, including financial transaction information, healthcare records, and other personally identifiable information for customers, partners, and employees. Much of this data is subject to regulations such as SOX, PCI DSS, HIPAA, and GDPR. Therefore, any data breach can result in regulatory fines, lost revenue, remediation costs, legal fees, …Read more
January 27, 2021 Bill Hammond
Nowadays, companies tend to have vast troves of data stored on their IT platforms. Many companies are struggling to use that data – including critical data on IBM i – that could, in theory, help to make better business decisions and run operations more smoothly and efficiently. But in reality, that data is frequently siloed, inaccurate, and unsecured – leading CEOs to be concerned about the integrity of the data upon which they are basing decisions. Businesses across the globe are screaming for data they can trust.
The pace of digital transformation initiatives has rapidly accelerated in the past year, …Read more