SRC Secure Solutions: Software for Data Protection and Security Administration & Compliance

Exposure of enterprise data (especially sensitive data) can present a huge risk to business continuity. You are obliged by standards, laws and regulations to secure your systems and protect your data against breeches.

You are required by your auditors to supply proof of the measures you have taken to strengthen your IT security. After all data breeches do occur – and frequently.

Security and compliance require you to properly monitor your network and systems on it.

Read more: Newsletter April 2011- Article 1

How safe is information on IBM i?

By Stephen R. Cheney

Increasing challenge of data breaches

Almost every day we read of a successful hacking attempt exposing private information to criminals and the like. In late April Sony’s Playstation online community was disabled by hackers affecting more than 70 million users. At first it was thought that the hackers had only effected a DoS (Denial of Service) to the playstation users but later Sony revealed that the database containing the user-id’s, email addresses, passwords and even credit-card details has been hacked. The damage to Sony was estimated at $1.4 billion – in future claims, lost clients and of course huge damage to their brand’s reputation. It is not known to me what platform the community database is held on.

Read more: Newsletter July 2011- Article 1

rsa_securedRaz-Lee's iSecurity suite of products is a comprehensive, user-friendly auditing, compliance and security solution for IBM i (AS/400) environments. iSecurity products address insider threats, external security risks, and the need to monitor business-critical application. Read more go to the EMC Solution Gallery.