Contact us for Pricing or Questions: (888) 682-5335

How to Accelerate the Use of AI in Organizations

How to Accelerate the Use of AI in Organizations
Written by: Bob Picciano Open any business publication or digital journal today, and you will read about the promise of AI, known as artificial or augmented intelligence, and how it will transform your business. The fact is, AI will not only transform your entire business, whether you are in health care, finance, retail or manufacturing, but it will also transform technology itself. The essential task of information technology (IT), and how we measure its value, has reached an inflection point. ...
Continue reading

IBM i Multi-Factor Authentication for MFA Compliance

IBM i Multi-Factor Authentication (MFA) is a critical cybersecurity defense required by PCI, FFIEC and 23 NYCRR 500 in Section 500.12b, stating any company providing financial services within the state of New York must implement MFA to protect system data and applications for all users that have external network access, or use an approved access control equivalent. IBM i Multi Factor Authentication prices are very affordable, simple to implement and provide the quickest means to protect against ...
Continue reading

SFTP FTPS - IBM i iSeries Secure FTP Methods

SFTP and FTPS are Secure FTP methods the IBM i supports natively for both client and server roles, and can safely transfer sensitive files to and from other systems or cloud services. Secure FTP requirements may dictate using SFTP versus FTPS for the MFT project, but is usually a personal preference. Both SFTP and FTPS use encrypted connections for file transfer, SFTP uses SSH cryptographic protocol and FTPS can use TLS or SSL implicit security (always on) cryptographic protocol. FTPS explicit c...
Continue reading

IBM QRadar Price List

    QRadar Manufacturer Suggested Retail Price Chart by License * MSRP QRadar SIEM by IBM Security - Event Processor Virtual 1690 - Failover Install License + SW Subscription & Support 12 Months (D0WSSLL) $6,420.00 QRadar SIEM by IBM Security - Flow Processor Virtual 1790 - Failover Install License + SW Subscription & Support 12 Months (D0WSYLL) $6,420.00 QRadar SIEM by IBM Security - Console Virtual 3190 - Failover Install License + SW Subscription & Support 12 Months (D0W...
Continue reading

QRadar SIEM from Splunk Switch

If you are switching from Splunk to QRadar SIEM or just curious to see the additional functionality QRadar has in comparison to Splunk, you should check out the new free Splunk to QRadar SIEM App that enables forwarding of raw data from Splunk Enterprise or the Splunk Universal Forwarder to QRadar for analysis. Once the QRadar app connects to Splunk forwarders, a list of data sources are displayed to choose which logs are forwarded to QRadar. This QRadar app modifies the appropriate Splunk confi...
Continue reading

iSeries FIM File Integrity Monitoring on IBM i

iSeries_FIM Iseries File Integrity Monitoring
File integrity monitoring FIM  for iSeries IBM i requires monitoring the system security audit journal and DB2 database journals to detect unauthorized changes to files and their contents. FIM projects are usually due to compliance regulations such as PCI, 23 NYCRR 500 and like regulatory requirements, which will significantly reduce the file integrity monitoring scope to specific database files and object changes in QAUDJRN. In addition to implementing file integrity monitoring, you will n...
Continue reading

IBM i Profile Swapping for Temporary Elevated Authority

Implementing iSeries Profile Swapping and Adopted Authority policies is a great idea for reducing the number of IBM i powerful profiles, especially if most users only need elevated authority for specific tasks or occasional access to sensitive data. In many cases, auditors are requiring iSeries shops to address their large list of users profiles with special authorities. On some iSeries systems, most of the users will have *ALLOBJ, yet none of them have duties that would require such authorities...
Continue reading

GDPR Compliance for iSeries AS400

General Data Protection Regulation GDPR compliance applies to any company that transmits, stores or processes personal data of individuals living in countries in the European Union, such as insurance, healthcare, financial, retail and like B2C industries. This GDPR article addresses protection recommendations for personal data residing on the IBM i...
Continue reading

Switching from Splunk to QRadar SIEM?

If you are switching from Splunk to QRadar SIEM or just curious to see the additional functionality QRadar has in comparison to Splunk, you should check out the new free Splunk to QRadar SIEM App that enables forwarding of raw data from Splunk Enterprise or the Splunk Universal Forwarder to QRadar for analysis. Once the QRadar app connects to Splun...
Continue reading

SIEM Machine Learning AI and Behavior Analytics

SIEM Machine Learning AI and Behavior Analytics
Cybersecurity breaches caused by employees account for roughly 75% of all data breaches. Internal security threats are usually among the costliest attacks and remain the hardest to detect and solve. Even with the numerous security defenses and controls, user account compromises are still one of the most commonly used methods of attack. Employee awa...
Continue reading

​iSeries MFA Multi-Factor Authentication

iSeries MFA provides Multi-Factor Authentication to prevent unauthorized user access to systems by adding two or more authentication requirements before allowing access to the IBM i system through 5250 OS400 Sign-on or other applications running on the AS400 system. IBM i MFA is being driven primarily by increased cybersecurity threats, a...
Continue reading

QRadar SIEM Varonis app

QRadar SIEM Varonis app
The QRadar SIEM app list grew even larger last month with the addition of 2 more cybersecurity vendors. Varonis Systems, Inc., a pioneer in data security and analytics, launched an app for integration with QRadar SIEM security intelligence platform that provides companies with comprehensive visibility and response capabilities for all data security...
Continue reading

Cybersecurity threats in 2018

Cybersecurity threats in 2018
Webroot just released their latest cybersecurity threat report after analyzing data from the first half of 2018, and results show hardware can be just as vulnerable to attacks due to exploitable flaws as the software that runs on it. Meltdown and Spectre were the clear winners, affecting almost every device known to mankind that has a processor. It...
Continue reading

QRadar recognized as SIEM leader 10 years in a row

QRadar recognized as SIEM leader 10 years in a row
QRadar SIEM Security Intelligence Platform is recognized as a Leader for the 10 th consecutive year in the latest Forrester comparison report "Wave on Security Analytics". IBM has made many significant enhancements to QRadar over the years, outpacing its competitors in the SIEM security information and event management market place, particularly in...
Continue reading

QRadar App for Cloud Infrastructures

QRadar App for Cloud Infrastructures
QRadar Cloud Visibility app on the x-Force app exchange is for managing and providing security for Amazon Web Services, Microsoft Azure, and IBM Cloud environments. This app should not be confused with QRadar on Cloud offering for IBM SIEM Saas. This free QRadar app leverages existing QRadar cloud integrations that bri...
Continue reading

QRadar adds TruSTAR Threat Intelligence App

QRadar adds TruSTAR Threat Intelligence App
QRadar ​  TruSTAR's app enables ingestion of OSINT, 3rd party cybersecurity threat intelligence, ISAC/ISAO feeds and your own internal data into your QRadar instance. TruSTAR is a threat intelligence platform designed to accelerate incident analysis process and exchange of intelligence among various internal and external teams. This App a...
Continue reading

Cybersecurity AI and SIEM Security Machine Learning

Cybersecurity AI and SIEM Security Machine Learning
Cyber Security Cybersecurity AI integrated SIEM Security tools accurately identify and prevent attacks in a fraction of the time and cost humans are capable, using security automation. Companies are struggling to identify and keep up with cybersecurity, internal threats and vulnerabilities in a timely manner, which are mainly due to manua...
Continue reading

The Big Difference Between Power9's Industry Standard Memory vs Buffered Memory

Stock_Servers_Composite-25pct
POWER9 Memory changes and what it means. Our last article was about the primary changes made to the POWER Systems, scale out line up with the release of the first set of POWER9  (You can view some of the POWER9 benchmarks here ) servers back in February. We briefly covered several of the changes including the change made to the type ...
Continue reading

POWER9: Main changes and updates Vs POWER8

POWER9: Main changes and updates Vs POWER8
POWER9 is here , and with it comes loads of new hardware. With the second batch of released hardware there are several new systems that are focused on small and mid-range applications. These include the S922 , S914 , and S924 as well as Linux and SAP Hana specialized variants, the L922, L924, H922, and H924. The new systems are utilizing POWER9 pro...
Continue reading

10 Facts you need to know about the POWER9 S924 CPUs:

Nigel Griffiths presents 10 useful facts about performance, history and architecture of IBM's Power9  S924 System CPUs. Nigel works for IBM Advanced Technology Support, Europe. His job is to promote IBM Power Systems, PowerVM and AIX Technology. He not an IBM spokesperson. All opinions are his own. 1) 1 or 2 sockets for 1 or 2 POWER9...
Continue reading
Google+