
Log Forwarding with Ironstream for Splunk
Over the past several years, Splunk has become a definitive leader in analyzing log data, giving its customers the power to turn the insights from this machine data into action. Splunk enables users...
Over the past several years, Splunk has become a definitive leader in analyzing log data, giving its customers the power to turn the insights from this machine data into action. Splunk enables users...
Virtually every successful business today relies on IT systems that can remain up and running 24×7. Downtime is expensive, and as computing plays a more critical role in so much of what we do,...
Cybersecurity has been a hot topic this year, with several high-profile news stories emerging that have underscored the potential costs for malware defense both in money and reputation, of...
Too many privileged users constitute a significant data management and security risk. However, providing users and systems with the least access necessary is complex. Administrators need tools for...
In April 2019, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously...
This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focused on how elevated authorities can create the risk for a data...
This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focuses on how elevated authorities can create the risk for a data...
This article on the California Consumer Privacy Act (CCPA) was originally published in Enterprise Tech Journal. Part one of this two part post focused on an overview of the CCPA regulations and the...
In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the...