• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Fresche Bolsters MFA with IBM i Exit Point Coverage

    December 6, 2023 Alex Woodie

    Organizations relying on Fresche Solutions’ multi-factor authentication (MFA) to protect their IBM i assets can now implement more fine-grained enforcement by protecting access to IBM i exit points, the company announced recently. The MFA offering also now hooks into enterprise-level MFA solutions.

    MFA has emerged as a minimum standard for protecting critical IT assets and data, as well as for preventing ransomware attacks. Even if a cybercriminal were to obtain the user ID and password to access sensitive applications and data, MFA serves as a difficult-to-overcome barrier that slows, if not prevents, them from actually getting into systems.

    Fresche Solutions …

    Read more
  • Trinity Guard Brings Security Suite Up to Speed with IBM i 7.5

    September 21, 2022 Alex Woodie

    IBM put a major focus on improving security with the release of IBM i 7.5 earlier this year, with stronger out-of-the-box default configurations, new password controls, and improved monitoring. With the launch of TG Suite 3.0, Trinity Guard is helping its customers get the most out of those security improvements.

    IBM made a slew of security improvements with the launch of IBM i 7.5, which it unveiled in May and which shipped soon thereafter. Highlights include the elimination of security level 20, a new password level 4 that includes 512-bit encryption, the elimination of default passwords, and new table functions …

    Read more
  • Thoroughly Modern: Good Security Is Just As Important As Good Code

    June 13, 2022 Pauline Brazil Ayala

    Can my IBM i really be hit with a virus? Can it be hit with ransomware?

    These are the questions I regularly get from clients as a security expert with more than 20 years of experience. With the pervasiveness of these ransomware threats and sophisticated cyberattacks that we’re seeing in recent times, it only makes sense that we pay close attention to these threats.

    Security on the IBM i is a complex topic, and it is not one that is easily tackled with a few bullet points and tweaks of systems settings. Just like programming on the platform, for that …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle