IBM Systems Magazine, Power Systems - January 2018 - SE31
Sponsored Advertising Content
iSecurity Firewall has a unique
algorithm that saves precious work
time by eliminating the need for
predefined security rule priorities.
The software automatically selects
and dynamically applies the most
suitable and efficient rules, thereby
minimizing throughput delays.
Firewall rule wizards greatly simplify
the security definition process,
extracting and summarizing data
from the history logs and then
displaying the actual transaction
statistics alongside current rules.
QJRN/400 by Cilasoft helps
companies achieve regulatory
compliance by enhancing IBM i
journaling-the preferred audit
source of both security and
compliance audit professionals.
QJRN/400 lets you create custom
alerts as well as concise, readable
reports-based on system activity
or database changes-that can
automatically route to management.
Plus, QJRN/400 interfaces with
leading SIEM consoles.
TGAudit provides a security
auditing toolbox with built-in
security knowledge that reports on
IBM i system audit information and
data-level changes. It also monitors
(888) 729-5334 x1
With TGAudit, you can execute
report cards with reports mapped
to standard compliance regulations,
such as PCI, HIPAA and SOX, so you
can quickly evaluate potential IBM i
Steve Will in You and i; and Dawn May in i Can
Voices from within (IBM)
They are our voices from within-Steve Will and Dawn May-straight from the source: IBM.
Steve Will is the chief architect for IBM i, responsible for strategy and planning related to the OS and its
related products and solutions. Dawn May is a senior technical staff member and currently a consultant on
IBM Systems Director in IBM Lab Services and Training located out of IBM/Rochester.
r Get it from inside IBM:
Steve Will in You and i: ibmsystemsmag.com/blogs/you-and-i
Dawn May in i Can: ibmsystemsmag.com/blogs/i-can
ibmsystemsmag.com/buyersguide 2018 // 31