iSecurity Manuals
- Audit 14.12 - UserManual
- Action 13 - User Manual
- Antivirus 7.66 - UserManual
- AuthorityOnDemand 6.01 - UserManual
- Capture 5.01 - UserManual
- ChangeTracker 1.35 - UserManual
- Command 17.31 - UserManual
- Firewall 17.36 - UserManual
- isecurity installation guide
- PasswordReset 5.21 - UserManual
- ap-journal - UserManual
GDPR (AVG)
Legislative documentation
- GDPR Regulation EU Journal
- European Commission Justice Protection of personal data in the European UnionProtection of personal data in the European Union
- Algemene Verordening Gegevensbescherming (AVG) - Dutch
GDPR introduction
- IBM - "How it Works" GDPR
- What Is GDPR?
- What Does GDPR Mean to an IT Manager, CTO, or Systems Admin?
- UK Information Commissioners Office - Preparing for GDPR - 12 steps to take now
- What Are the Top 10 Ways to Prepare for GDPR?
- SRC Solutions offers independent risk assessments for IBM System z, i and open systems
- Meet GDPR Requirements with SmartCrypt
- DATA PROTECTION BY DESIGN Preparing for Europe’s New Security RegulationsPreparing for Europe’s New Security Regulations
Whitepapers
- White Paper - Using SmartCrypt TDE for GDPR Compliance
- White Paper - DATA PROTECTION BY DESIGN - Preparing for Europe’s New Security RegulationsPreparing for Europe’s New Security Regulations
- White Paper - Deception and the GDPR
- iSecurity for GDPR Presentation
- iSecurity for GDPR Datasheet
- PKWARE Smart Encryption Platform, With your data security strategy, find ways to: Avoid Complexity, Reduce Cost, Nullify Threats
- Complexities and cost traditionally associated with implementing strong encryption on the mainframe. Mainframe Cryptography: Discovering a Better Way
- How risks to the confidentiality of data on the mainframe has changed. Spotlight on Mainframe Security:Privacy in the Data Center
- Spotlight on Mainframe Security: Data Protection at the Heart of the Enterprise
- Overview of recent technology standards that are affecting systems and software used by the Federal Government. Secure Government Computing
- SecureZIP technology, its foundation within PKZIP, and the evolution of the ZIP family of products. End to End Enterprise Encryption
- SecureZIP and IBM z/Series Integrated Cryptographic Services Facility the white paper "SZ and IBM ICSF."
- Forrester report Secure the Data and not just the Underlying Infrastructure the white paper "Secure The Data."
- Overcoming the obstacles: Creating cooperative partnerships in securing the exchange of data the security policy white paper "Overcoming the Obstacles."
- Desktop Security Guide Whitepaper: Desktop Security Guide
If you want more information please contact us
- IFS in review by Carol Woodbury of SkyView Partners IFS in Review
- Confused by the Data Security Standards from the Payment Card Industry? Understand how SkyView Partners' products can help by reading the white paper "How SkyView Products Assist with PCI Compliance."
- Understand the pitfalls of using Exit Programs to attain compliance rather than using i5/OS Object Level Security in the white paper "Object Level Security vs. Exit Point Security."
- Update your policy with the concepts found in the security policy white paper "Data Classification and Ownership."
- Changes due to security compliance requirements can be difficult on staff. Learn how to reduce the stress with the suggestions found in the compliance white paper "You Don't Trust Me!"
- Compliance with many regulations requires control over programmer access. Find out how to accomplish this with the compliance white paper "What Programmers Really Need."
- Get advice on whether a virus scanning policy for System i or iSeries is required in the policy white paper "Virus Got You Down?"
- IBM i User management at ABN AMRO a case study (Dutch) Case Study iMenu400 at ABN AMRO (Dutch)
If you want more information please contact us