IBM’s New MFA Offering is a Step in the Right Direction – But Only Part of the Picture

Key Takeaways MFA is essential for protecting against modern cyber threats. IBM’s new built-in support for IBM i systems signals just how important it has become. Precisely Assure MFA offers broader, more flexible protection across interfaces, users, and access points – making it the enterprise-ready choice for securing IBM i environments. Evaluate your MFA strategy […]

Zero Trust Security for IBM i: How Does It Work?

Zero Trust Security for IBM i How Does It Work

IBM Power Systems running the IBM i operating systems are noted for their robust security. Yet without proactive user management and attention to security settings (zero trust), even these highly reliable systems are vulnerable to attack. The IBM i platform was designed before the cloud era, and although it has evolved over the years, approaches […]

Data Security 101: Data Security Terms and Concepts

Data Security 101: Data Security Terms and Concepts

You know you should keep your data secure, but do you know how? Do you know the meaning of terms like compliance, multi-factor authentication and data tokenization? If not, this post is for you. Keep reading for an overview of core concepts and methods for securing data. Caveat Before we get started, we should note […]

Using the Cloud to Protect Mission-Critical Workloads

Using the Cloud to Protect Mission-Critical Workloads

Cloud computing offers a wide range of new use cases for IBM shops. Following the dramatic increase in remote work following the COVID-19 pandemic, the shift toward IBM i in the cloud has gained momentum. In addition to the inherent flexibility that a  cloud solution has to offer, this has opened up a host of […]

System Logging on the IBM i (as400): An Introduction

System Logging on the IBM i (as400): An Introduction

As a company that works hard to protect your data, we get a lot of questions.  One topic that we frequently get asked about is system logging on the IBM i.  System logging on the IBM i is different from logging on other platforms. In an interview with Patrick Townsend, Founder & CEO of Townsend […]

What Do Hackers Really Want to Do With Your Data?

What Do Hackers Really Want to Do With Your Data?

You know hackers want to steal your data. But what do hackers want to do with it? This article explains. Understanding hackers’ motives is important for developing strong data protection strategies. If you don’t know exactly why attackers want to steal your data, it’s difficult to plan effective measures for stopping them. Inside the minds […]

PGP vs. RSA: How Are They Different?

PGP vs. RSA Encryption: How Are They Different?

With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the different types of encryption available – PGP vs RSA. Some are more appropriate for internal purposes, such as with large databases. Others may be more effective […]

AES vs PGP Encryption: What is the Difference?

AES vs PGP Encryption: What is the Difference?

In the world of data security there are many different types of encryption, but arguably the two most common are AES and PGP. With so many three-letter acronyms in the technical landscape, it’s easy to get lost in data security conversations. So let’s catch up! First, we’ll define both AES and PGP encryption, and then […]

AES vs DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

Every so often, we encounter someone still using antiquated DES for encryption.  If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To better understand why: let’s compare AES vs DES encryption: Data Encryption Standard (DES) What is DES encryption? DES is a symmetric block cipher (shared secret key), […]

6 Industries That Stick with Mainframes and Why They Do

6 Industries That Stick with Mainframes and Why They Do

What do 96 of the world’s 100 largest banks, 90% of the largest insurance companies, 92% of the largest retailers in the United States, and 71% of the Fortune 500 have in common? They all continue to depend on mainframes for their most business-critical processing. Despite a drumbeat of tech punditry that for years has […]

Multi-Factor Authentication for OKTA Users

Multi-Factor Authentication for OKTA Users

Multi-Factor Authentication (MFA) is becoming increasingly important in today’s highly connected world. With cybersecurity threats on the increase, MFA adds a valuable layer of login data security that is especially difficult for hackers to circumvent. Most people have used MFA at one time or another, even if they may not be familiar with the terminology. […]