• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Adds Zero-Trust Features To IBM i Firewall

    March 18, 2024 Alex Woodie

    IBM i shops that are looking to implement a zero-trust security posture in their IBM i systems may want to check out Raz-Lee Security. The software company has added micro-segmentation capability to its iSecurity Firewall product, giving IBM i shops another level of control over their networks.

    Zero-trust is one of the more promising methods to secure an internal network these days, as it requires users to be authenticated, authorized, and continuously validated before being granted access to internal applications or data. It has been widely adopted in corporate networks as one aspect of a strong defense, particularly in Windows …

    Read more
  • Highly Secure API Enablement for IBM i

    August 1, 2022 Daniel Magid

    The explosive growth of APIs (Application Programming Interfaces) over the past few years has dramatically transformed how business is conducted. APIs allow customers to increase revenue by leveraging new channels to reach their customers; they facilitate cost reduction by automating manual processes and raising an organization’s responsiveness. In many industries, the benefits of APIs are so compelling that it is already impossible to compete or participate in a business supply chain without supporting APIs.

    However, opening up your core IBM i applications to API connections also carries risks. According to the Gartner Group, APIs are rapidly becoming the number one …

    Read more
  • Guru: IBM i Privileged Account Management, And What’s So Special About Special Authorities

    August 1, 2022 Bruce Bading

    Privileged Account Management (PAM) is a keystone of cybersecurity. Everywhere we look PAM is a hot topic. How and why should we worry about it? IBM, Ponemon, Verizon, etc., tell you that it is vitally important to protect your endpoints from cyberattacks and insider threats. While the Verizon DBIR states that external threats account for 80 percent of security incidents, it points out their findings that show otherwise for incidents resulting in data compromise where the insider threat exceeded that of an outsider by more than 10 to one. Simply put by Verizon, “This supports the principle that …

    Read more
  • How IBM i Fits Into a Zero-Trust Security Framework

    July 19, 2021 Alex Woodie

    One of the hot new trends in cybersecurity these days is the zero-trust security model. Instead of implicitly trusting network traffic behind the firewall, zero-trust demands that traffic have explicit permission to be there. But how does that model work with the strange beast known as IBM i? IT Jungle recently sat down with PJ Kirner, the CTO and co-founder of zero-trust software provider Illumio, to find out.

    Illumio is an eight-year-old venture-backed startup based in Sunnyvale, California, that is working in the field of zero-trust security. It develops an offering, called Illumio Core, that allows companies to begin implementing …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle