• October 20, 2020
Security

How Multi-factor Authentication Can Benefit Your Industry

Depending on what industry you’re in, your approach to security may be very different. For some sectors, like finance, security and data protection are top of mind for everything that is done. Financial services organizations typically experience the most data breaches and hacks, which makes security a priority. But what about healthcare? Patient data is […]

Security

The complexities of z/OSMF security set up for Zowe

IBM z/OS management facility (z/OSMF) provides system management functions in a task-oriented, web browser-based user interface with integrated user assistance. This allows you to manage the day-to-day operations and administration of your mainframe z/OS systems more easily. By streamlining some traditional tasks and automating others, z/OSMF can help to simplify areas of z/OS system management. […]

Security

Productive on Power Part Three: Modernizing Without Compromising Security

Welcome to the third and final part of our three-part “Productive on Power: Bringing the latest User Experiences to IBM i” blog series. These posts are covering modernization initiatives that are making users and customers more productive and more satisfied. We’re sharing cost-effective strategies to bring great experiences to your IBM i by: Modernizing the […]

Security

What happens when remote work becomes permanent?

As someone responsible for IT security, March 15 brought about a huge change in my department. With the pandemic closing offices and forcing people to stay home, I suddenly had to think about what it means to implement IT security for thousands of remote workers, instead of a handful of office spaces. And as uncertainty […]

IT Priorities During the Pandemic

The worldwide calamity caused by the COVID-19 pandemic has impacted nearly all sectors of business, forcing them to change. In most cases, they have been forced to reconsider their 2020 business plans altogether. For most of you reading this, any projects slated for this year that were eating up sizable portions of your budget were […]

Security

Introducing IBM Z MFA v2.1 and its z/VM support

Secure authentication to critical IT infrastructure is paramount. Multi factor authentication is a critical improvement over legacy userid and password technology. The introduction of the IBM Z Multi-Factor Authentication V2.1 product enables the IBM z/VM operating system to benefit from this security improvement.  With a larger remote workforce, it is paramount that all systems are […]

Security

Password Security: Single Factor, 2FA and Multi-Factor Authentication

On May 7, IT and technology businesses around the world celebrated World Password Day, a day meant to remind everyone of the importance of keeping personal and business data protected and secure. Unfortunately, surveys released on that day revealed that the changing dynamics of work—that is, the increase of remote workers—are putting password security in […]

Security

Adapting to the new normal: Remote work and the mainframe

Work from home has become an essential business proposition and it’s not just for today. It’s something that we’re going to live with for many years. As a result, we need to rethink how we’re connecting to the mainframe today. Accessing the mainframe First things first, a connection is necessary. Rocket BlueZone Web 3270 emulator. […]

Security

“Set it and forget it” should not be your approach to cybersecurity

As the world turns to remote working in light of the recent COVID-19 pandemic, cybersecurity is becoming a hot topic. Many businesses were forced to adapt quickly to remote work, without a security plan in place. Other businesses were already set up for remote work, but with an uncertain timeline, some aspects of cybersecurity may […]

Reducing Shadow IT Through Digital Transformation

All businesses today have a hybrid IT environment. They pay for collections of servers,  be they UNIX servers, Windows servers, cloud servers or mainframe servers. Other IT spending includes mobile,  desktop and end-user devices. In many cases, those budgets might be by server domain, so the mainframe budget is separate and independent of the rest […]