European law dictates that companies, financial corporations and government agencies are required to secure their sensitive personal data. Although every sector has their own security regulations they all work in similar way: software and hardware must comply to strict and detailed rules and procedures. The organisations have to prove their continuous efforts to comply to these regulations, failures to comply are heavily fined. Every organisation is responsible for their own security, meaning that risk assessments are essential. In this article Infosecurity Magazine asked SRC Secure Solutions about their field experiences with independent risk assessments.

Is your IBM i secure and why should you care?

  • Are you under pressure from the regulators of SOX, JSOX, PCI, WBP etc?
  • Do you plan to open your IBM i Web applications to your customers?

Following the success of our second seminar on security and compliance for the IBM i we have published the presentation sheets in PDF form. You can download these PDF's using the links on the right.

How secure is your data on IBM i?
How and why should you secure your IBM i
How does IBM i become compliant in 15 minutes?
How do you meet the demands of the auditors?

If you want more information please contact us

If you want more information please contact us

If you want more information please contact us

 

If you want more information please contact us