• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Thoroughly Modern: The Synon Transformation Journey, From Legacy To Modern Java Solutions

    July 8, 2024 Chris Koppe

    In today’s evolving tech landscape, companies that run CA 2E (Synon) on IBM i face significant challenges hindering progress and sustainability. Synon represents a fraction of the market share in IBM i environments, far behind RPG and COBOL, and IBM’s recent announcement to cease PL/I support in future OS versions will impact compliance for SOX-regulated and other industries.

    Moreover, shifts in ownership – from Computer Associates to Broadcom – cast doubt on Synon’s long-term viability and continued support. A dwindling pool of Synon developers, brittle applications that are difficult to integrate with modern technologies, and cryptic database structures further add …

    Read more
  • Guru: SIEM Is Only Part Of IBM i Cybersecurity

    March 28, 2022 Bruce Bading

    Many times, we hear from IBM i business owners that their SIEM – that’s short for Security Information and Event Management – is their cybersecurity solution for the IBM i. But that can’t be true, and I want to explain why it is part of the security shield but certainly not all of it.

    Let’s start with SIEMs and how they fit into cybersecurity frameworks. SIEM is mentioned in the PCI appendix, but not once in the core of the 250+ PCI DSS requirements, likewise, the NIST Cybersecurity Framework lists event monitoring as one of the 100s (1/100s) of NIST …

    Read more
  • Thoroughly Modern: IBM i Security Is No Longer Set It And Forget It

    March 14, 2022 Amal Macdonald

    For most IBM i shops, who are busy creating and maintaining the applications that run the business and who are not just chronically understaffed but structurally understaffed, the smartest thing they can do when it comes to security is give up.

    You heard that right. They need to put their arms in the air and surrender, absolutely and completely.

    No, we don’t mean they need to open all of the ports on their server, turn off the firewall, and let the ransomware and malware in and let the hackers and phishers do whatever they will. What we do mean by …

    Read more
  • Strengthen IBM i Password Security With Multi-Factor Authentication

    March 15, 2021 Bill Hammond

    As stories of data breaches caused by exploited credentials continue to make headlines, basic password protection mechanisms are no longer good enough. Organizations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.

    IBM i systems contain the data that drives your business, including financial transaction information, healthcare records, and other personally identifiable information for customers, partners, and employees. Much of this data is subject to regulations such as SOX, PCI DSS, HIPAA, and GDPR. Therefore, any data breach can result in regulatory fines, lost revenue, remediation costs, legal fees, …

    Read more
  • Trinity Guard Unveils New Tools for Linux, Db2 for i

    November 18, 2020 Alex Woodie

    Trinity Guard is on the move. The Houston, Texas, based security software company, which is the spiritual successor to the PentaSafe products, is rolling out a full auditing solution for Linux. It’s also developing a Linux version of its security management tool, TGCentral, with an AIX version up next. Plus it’s months away from releasing an encryption solution for Db2 for i.

    2020 has not been easy for anyone, but it’s not stopping the folks at Trinity Guard from moving forward on its roadmap items. Near the top of that list is increased support for running on Linux, which has …

    Read more
  • Confidence in IBM i Security Is Dropping, Syncsort Says

    May 6, 2020 Alex Woodie

    IBM i shops were significantly less confident in their ability to prevent a security breach in 2019 than the previous two years, according to a new study by Syncsort. More than 40 percent of IBM i shops have suffered at least one security breach, according to the study, which also indicates that awareness of security regulations is growing, but not for the ones you might think.

    In 2019, 11 percent of respondents reported being somewhat or very unconfident in their ability to prevent a data breach at their organization, Syncsort concluded in its new study, which is titled “IBM i …

    Read more
  • Security Still the Top Concern as Privacy Regs Loom

    February 12, 2020 Alex Woodie

    For the fourth year in a row, security is the number one concern of the IBM i installed base, according to HelpSystems’ 2020 IBM i Marketplace Survey. IBM i shops are clearly concerned about the need to prevent unauthorized access to applications and data. But security’s first cousin, data privacy, also stands to gain more attention with the recent passage of data privacy laws, such as GDPR and CCPA.

    HelpSystems released the results of its latest marketplace survey last month, as it has done for the past six years. And just as it has for every year since 2017, security …

    Read more
  • Trinity Guard Gives Audit Tool A Friendly GUI

    June 25, 2018 Alex Woodie

    IT professionals who are tired of using 5250 greenscreens to manually conduct regulatory audits of their IBM i systems may be interested in a colorful piece of software from Trinity Guard. The company recently launched TGCentral, which is a unified HTML interface designed to simplify the configuration and execution of security and regulatory audits across multiple IBM i servers.

    As the spiritual and intellectual successor to PentaSafe, Trinity Guard understands how beloved those old PentaSafe products were. Even though NetIQ/Attachmate/Micro Focus has not added any new features to its IBM i security suite for over a decade, there were …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle