Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  


RSS Feed    Add to Google    Add to My Yahoo!
i5 Reports
Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009


RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Security Primer: Top Tips for Protecting Your System i
sponsored by Bytware, Inc.
WHITE PAPER: This E-Guide from TechTarget's Search400.com explores the many components of System i security.
Posted: 06 Mar 2008 | Published: 06 Mar 2008

Bytware, Inc.

IBM Eye: Security Detective for Hire
sponsored by PowerTech
TECHNICAL ARTICLE: This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.
Posted: 25 Sep 2009 | Published: 25 Sep 2009


Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007


Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas
sponsored by Help/Systems
CASE STUDY: Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems.
Posted: 19 Oct 2009 | Published: 19 Oct 2009


PowerTech Easy Pass Saves Chisago County Time and Valuable Resources
sponsored by PowerTech
CASE STUDY: Chisago County needed a preventative measure to increase their level of AS/400 security and to eliminate the need for users to write down their passwords which posed a real security threat. They also needed a low maintenance solution. Enter PowerTech.
Posted: 16 Apr 2007 | Published: 02 Oct 2006


Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
i5 White Papers | i5 Multimedia | i5 IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement