• Products
    • Integrate
      • Precisely Connect
        • Connect
      • Precisely Ironstream
        • Ironstream
        • Ironstream for Splunk®
        • Ironstream for ServiceNow®
      • Precisely Assure
        • Assure Security
        • Enforcive
        • Assure MIMIX
        • Assure MIMIX for AIX®
        • Assure QuickEDD
        • Assure iTERA
      • Precisely Syncsort
        • Syncsort MFX
        • Syncsort Optimize IMS
        • Syncsort Optimize DB2
        • Syncsort Optimize IDMS
        • Syncsort Network Management
        • Syncsort Capacity Management
    • Verify
      • Precisely Spectrum Quality
        • Spectrum Discovery
        • Spectrum Quality
        • Spectrum Global Addressing
      • Precisely Spectrum Context
        • Spectrum Context Graph
        • Spectrum Data Federation
        • Spectrum Machine Learning
      • Precisely Trillium
        • Trillium Discovery
        • Trillium Quality
        • Trillium Geolocation
    • Locate
      • Precisely Spectrum Spatial
        • Spectrum Spatial
        • Spectrum Spatial Routing
        • Spectrum Spatial Insights
      • Precisely Spectrum Geocoding
        • Spectrum Global Geocoding
        • Spectrum Enterprise Tax
      • Precisely MapInfo
        • MapInfo Pro
        • MapXtreme
    • Enrich
      • Precisely Addresses
      • Precisely Boundaries
      • Precisely Demographics
      • Precisely Points of Interest
      • Precisely Streets
    • Engage
      • EngageOne Communicate
        • EngageOne Communicate
        • EngageOne Converse
        • EngageOne Video
      • EngageOne Digital Self-Service
        • EngageOne Digital Self-Service
        • EngageOne Vault
      • EngageOne Compose
      • EngageOne Enrichment
    • Precisely Invent
    • Precisely Data Experience
    • Precisely Data Integrity Suite
  • Solutions
  • Support
    • Request Support
      • Find support by product
      • Create a customer case
      • Create a partner case
    • Support Resources
      • Ideas
      • Online forums
      • Precisely U
      • Software Maintenance Handbook
      • Blogs
      • Location Intelligence Product Downloads
    • Product Sites
      • Precisely APIs
      • Precisely Data Experience
      • MapInfo Marketplace
    • Contact
      • Contact Support
  • About us
    • Precisely
      • About us
      • Careers and Culture
      • Global offices
      • Leadership
    • Newsroom
      • Press releases
      • Events
      • In the news
      • Precisely Data Integrity Summit
    • Resource Center
      • All resources
      • Analyst reports
      • Customer stories
      • eBooks
      • Solution sheets
      • Videos
      • Webcasts
      • White papers
    • Contact
      • Get in touch
  • English
    • Français
    • Deutsch
    • 日本語
  • Get in touch
  • Products
  • Solutions
  • Support
  • About us
  • English
  • Get in touch
  • Products
    • Integrate
      • Precisely Connect
        • Connect
      • Precisely Ironstream
        • Ironstream
        • Ironstream for Splunk®
        • Ironstream for ServiceNow®
      • Precisely Assure
        • Assure Security
        • Enforcive
        • Assure MIMIX
        • Assure MIMIX for AIX®
        • Assure QuickEDD
        • Assure iTERA
      • Precisely Syncsort
        • Syncsort MFX
        • Syncsort Optimize IMS
        • Syncsort Optimize DB2
        • Syncsort Optimize IDMS
        • Syncsort Network Management
        • Syncsort Capacity Management
    • Verify
      • Precisely Spectrum Quality
        • Spectrum Discovery
        • Spectrum Quality
        • Spectrum Global Addressing
      • Precisely Spectrum Context
        • Spectrum Context Graph
        • Spectrum Data Federation
        • Spectrum Machine Learning
      • Precisely Trillium
        • Trillium Discovery
        • Trillium Quality
        • Trillium Geolocation
    • Locate
      • Precisely Spectrum Spatial
        • Spectrum Spatial
        • Spectrum Spatial Routing
        • Spectrum Spatial Insights
      • Precisely Spectrum Geocoding
        • Spectrum Global Geocoding
        • Spectrum Enterprise Tax
      • Precisely MapInfo
        • MapInfo Pro
        • MapXtreme
    • Enrich
      • Precisely Addresses
      • Precisely Boundaries
      • Precisely Demographics
      • Precisely Points of Interest
      • Precisely Streets
    • Engage
      • EngageOne Communicate
        • EngageOne Communicate
        • EngageOne Converse
        • EngageOne Video
      • EngageOne Digital Self-Service
        • EngageOne Digital Self-Service
        • EngageOne Vault
      • EngageOne Compose
      • EngageOne Enrichment
    • Precisely Invent
    • Precisely Data Experience
    • Precisely Data Integrity Suite
  • Solutions
  • Support
    • Request Support
      • Find support by product
      • Create a customer case
      • Create a partner case
    • Support Resources
      • Ideas
      • Online forums
      • Precisely U
      • Software Maintenance Handbook
      • Blogs
      • Location Intelligence Product Downloads
    • Product Sites
      • Precisely APIs
      • Precisely Data Experience
      • MapInfo Marketplace
    • Contact
      • Contact Support
  • About us
    • Precisely
      • About us
      • Careers and Culture
      • Global offices
      • Leadership
    • Newsroom
      • Press releases
      • Events
      • In the news
      • Precisely Data Integrity Summit
    • Resource Center
      • All resources
      • Analyst reports
      • Customer stories
      • eBooks
      • Solution sheets
      • Videos
      • Webcasts
      • White papers
    • Contact
      • Get in touch
  • English
    • Français
    • Deutsch
    • 日本語

Precisely Blog data security

Categories
  • Big Data
  • Company & Culture
  • Customer Engagement
  • Data Availability
  • Data Enrichment
  • Data Integrity
  • Data Quality
  • Data Security
  • Location Intelligence
  • Mainframe

data security

Categories
  • Big Data
  • Company & Culture
  • Customer Engagement
  • Data Availability
  • Data Enrichment
  • Data Integrity
  • Data Quality
  • Data Security
  • Location Intelligence
  • Mainframe

Blog > data security

Security Checklist for IBM i Systems

Security Checklist for IBM i Systems

For the past three years, Precisely has annually surveyed IT professionals who are responsible for IBM i systems at their companies. When respondents were asked to indicate their organization’s top...

Authors Photo Dawn Winston | Data Security | November 2, 2020
Achieve Comprehensive Security with Multi-Level Access Control

Achieve Comprehensive Security with Multi-Level Access Control

Thirty-four percent of data breaches last year involved inside actors, according to the  Verizon Data Breach Investigation Report. Employees can contribute to data loss due to simple errors or...

Authors Photo Precisely Editor | Data Security | July 24, 2020
Dangers of Encryption on the IBM i: 7 Pitfalls to Avoid

Dangers of Encryption on the IBM i (AS/400, i series): 7 Pitfalls to Avoid

IBM’s security implementation on the IBM i platform is good, but that doesn’t mean that it’s immune from data breaches. All PCs and servers on the same network as your IBM i server are...

Townsend Security | Data Security | July 7, 2020
AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

Every so often, we encounter someone still using antiquated DES for encryption.  If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To...

Townsend Security | Data Security | June 1, 2020
Data Security 101: Data Security Terms and Concepts

Data Security 101: Data Security Terms and Concepts

You know you should keep your data secure, but do you know how? Do you know the meaning of terms like compliance, multi-factor authentication and data tokenization? If not, this post is for you. Keep...

Authors Photo Christopher Tozzi | Data Security | May 12, 2020
AES vs PGP Encryption: What is the Difference?

AES vs PGP Encryption: What is the Difference?

In the world of data security there are many different types of encryption, but arguably the two most common are AES and PGP. With so many three-letter acronyms in the technical landscape, it’s...

Townsend Security | Data Security | May 8, 2020
Identify and Address 5 Top IBM i Security Threats

Identify and Address 5 Top IBM i Security Threats

The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...

Authors Photo Ron Franklin | Data Security | April 29, 2020
PGP vs. RSA Encryption: How Are They Different?

PGP vs. RSA: How Are They Different?

With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the...

Authors Photo Precisely Editor | Data Security | April 22, 2020
Why Data Encryption is Critical to FinTech

Why Data Encryption is Critical to FinTech

FinTech (financial technologies) is transforming the financial services industry. FinTech professionals from banks and credit unions to insurance companies deal with huge amounts of private data on a...

Townsend Security | Data Security | April 1, 2020
1 2 Next »

Let's Talk

Get in touch
  • Terms of Use
  • Privacy Policy
  • Trademarks
  • Sitemap

Copyright ©2021 Precisely. All rights reserved worldwide.

Precisely

  • About us
  • Leadership
  • Careers and Culture
  • EthicsPoint
  • FAQ
  • Contact

Discover

  • Blog
  • Newsroom
  • Partners
  • Precisely APIs
  • Glossary

Social

  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
OIIOIOIO
This site uses cookies to offer you a better browsing experience. Find out more on how we use cookies.OK