Learn practical, sound practices for properly configuring security settings within the IBM i OS, keep the OS and PTFs up to date and user profile management considerations.
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
shoofster provides centralized software management and self service access services.
shoofster is an industry leading edge data center networking solutions and services that enable organizations to manage their most vital software assets
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
shoofster provides centralized software management and self service access services.
shoofster is an industry leading edge data center networking solutions and services that enable organizations to manage their most vital software assets
Security best practices and regulatory compliance are a consistently moving target. In this presentation, Syncsort’s Product Management Director for Security Solutions, Jeff Uehling, shares what he’s learned over the past 30 years regarding IBM i Security best practices. You will learn:
Why you need to run at security level 50 – and the exposures of running at lower levels
How to detect and prevent programs that could compromise system security
How Syncsort’s security solutions can help you achieve best practice within your organization
Security considerations for mobile deployments
Higher-ed organizations constantly have to battle with user experience and security/compliance requirements. UNC Charlotte has developed a secure and easy way to implement PCI virtual terminals without hindering the end-user experience, and still meet all of the requirements for PCI.
Syncsort’s Latest HA Innovations and Security IntegrationPrecisely
Protecting your business’ critical IBM i data from downtime and breach requires a combination of powerful high availability, disaster recovery and security solutions. Syncsort, as a leader in both IBM i HA/DR and security, is delivering innovations that integrate these traditionally separate technologies.
View this webinar to see Syncsort’s new Enterprise Monitor, a common dashboard for viewing status from Assure Security, Assure MIMIX and Assure QuickEDD without requiring VPN access. We’ll also talk about switch enhancements that automate the process of keeping security in effect after a switch.
Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
Presentation about securing the environment that the Blackboard Learn application runs on. Includes:
* IPS/IDS
* Database Security Recommendations
* Load Balancer
etc.
Developing a Multi-Layered Defense for Your Systems and Data
Confidence in the security of your IBM i systems and data requires a solid understanding of potential vulnerabilities, the most effective best practices, and technologies that minimize the possibility of a data breach. We’ve grouped important security best practices and technologies into overlapping layers that provide multiple lines of defense. The ultimate goal is to always have another layer of security to thwart a would-be intruder.
Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this opportunity to learn about IBM i security best practices.
We’ll discuss:
• Common IBM i security vulnerabilities
• Configuring the security capabilities of the IBM i
• Implementing network security, access control, cryptography and more
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
z/OS Authorized Code Scanner (zACS) is a tool that provides the ability to test PCs and SVCs and client’s authorized code to provide diagnostic information for subsequent investigation as needed.
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Essential Layers of IBM i Security: System-Access SecurityPrecisely
Better understand the strategies and tactics to keep unauthorized users out of your IBM i and maintain tight controls over what authorized users can do once logged in.
Controlling Access to IBM i Systems and DataPrecisely
Security best practice and regulations such as SOX, HIPAA, GDPR and others require you to restrict access to your critical IBM i systems and their data, but this is easier said than done. Legacy, proprietary access protocols now co-exist with new, open-source protocols to create access control headaches.
View this webcast on-demand for an in-depth discussion of IBM i access points that must be secured and how exit points can be leveraged to accomplish the task. We’ll cover:
• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution
Security best practices and regulatory compliance are a consistently moving target. In this presentation, Syncsort’s Product Management Director for Security Solutions, Jeff Uehling, shares what he’s learned over the past 30 years regarding IBM i Security best practices. You will learn:
Why you need to run at security level 50 – and the exposures of running at lower levels
How to detect and prevent programs that could compromise system security
How Syncsort’s security solutions can help you achieve best practice within your organization
Security considerations for mobile deployments
Higher-ed organizations constantly have to battle with user experience and security/compliance requirements. UNC Charlotte has developed a secure and easy way to implement PCI virtual terminals without hindering the end-user experience, and still meet all of the requirements for PCI.
Syncsort’s Latest HA Innovations and Security IntegrationPrecisely
Protecting your business’ critical IBM i data from downtime and breach requires a combination of powerful high availability, disaster recovery and security solutions. Syncsort, as a leader in both IBM i HA/DR and security, is delivering innovations that integrate these traditionally separate technologies.
View this webinar to see Syncsort’s new Enterprise Monitor, a common dashboard for viewing status from Assure Security, Assure MIMIX and Assure QuickEDD without requiring VPN access. We’ll also talk about switch enhancements that automate the process of keeping security in effect after a switch.
Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
Presentation about securing the environment that the Blackboard Learn application runs on. Includes:
* IPS/IDS
* Database Security Recommendations
* Load Balancer
etc.
Developing a Multi-Layered Defense for Your Systems and Data
Confidence in the security of your IBM i systems and data requires a solid understanding of potential vulnerabilities, the most effective best practices, and technologies that minimize the possibility of a data breach. We’ve grouped important security best practices and technologies into overlapping layers that provide multiple lines of defense. The ultimate goal is to always have another layer of security to thwart a would-be intruder.
Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this opportunity to learn about IBM i security best practices.
We’ll discuss:
• Common IBM i security vulnerabilities
• Configuring the security capabilities of the IBM i
• Implementing network security, access control, cryptography and more
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
z/OS Authorized Code Scanner (zACS) is a tool that provides the ability to test PCs and SVCs and client’s authorized code to provide diagnostic information for subsequent investigation as needed.
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Essential Layers of IBM i Security: System-Access SecurityPrecisely
Better understand the strategies and tactics to keep unauthorized users out of your IBM i and maintain tight controls over what authorized users can do once logged in.
Controlling Access to IBM i Systems and DataPrecisely
Security best practice and regulations such as SOX, HIPAA, GDPR and others require you to restrict access to your critical IBM i systems and their data, but this is easier said than done. Legacy, proprietary access protocols now co-exist with new, open-source protocols to create access control headaches.
View this webcast on-demand for an in-depth discussion of IBM i access points that must be secured and how exit points can be leveraged to accomplish the task. We’ll cover:
• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Getting Started with IBM i Security: Securing PC AccessHelpSystems
This PowerPoint explains how to secure network access through PCs. Find out how well-known services like FTP and ODBC enable users to access sensitive data without oversight or restrictions. Exit programs and how you can use them to protect your organization are explained as well. Protect your system from unauthorized network access through readily available PC tools.
Expand Your Control of Access to IBM i Systems and DataPrecisely
Controlling all the ways your company’s data is being accessed, especially given the proliferation of open source software and other non-traditional data-access methods, is critical to ensuring security and regulatory compliance. This webinar reviews the different ways your data can be accessed, discusses how exit points work and how they can be managed, and why a global data access control strategy is especially important to efficiently protect sensitive data against unwanted access.
Topics include:
• IBM i access methods and risks
• Using exit programs to block traditional and modern access methods
• Real life examples and perspectives
Security 101: Controlling Access to IBM i Systems and DataPrecisely
To protect your critical data from access by unauthorized users or intruders and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. View this webinar on-demand to jump start your understanding of all the points of access that must be managed and how they can be secured using IBM i exit points.
You’ll learn:
• How to secure network access and communication ports
• How database access via open-source protocols can be secured
• How to take control of command execution
• How Syncsort’s security solutions can help
Security 101: Controlling Access to IBM i Systems and DataPrecisely
To protect your critical data from access by unauthorized users or intruders and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. View this webinar on-demand to jump start your understanding of all the points of access that must be managed and how they can be secured using IBM i exit points.
You’ll learn:
• How to secure network access and communication ports
• How database access via open-source protocols can be secured
• How to take control of command execution
• How Syncsort’s security solutions can help
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Precisely
Regulatory compliance and security of critical systems, applications and data are top-of-mind issues for IT organizations in 2018. New capabilities are now available from the Syncsort Assure products that can help your organization achieve and maintain compliance while strengthening IBM i security.
View this webinar on-demand to discover how new innovations from Syncsort can help you meet your auditing and control needs.
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
On April 8 Syncsort announced Assure Security, a new product that brings together Syncsort’s best-in-class IBM i security capabilities. Assure Security enables organizations like yours to comply with cybersecurity regulations and strengthen IBM i security through features that assess security vulnerabilities, control access to systems and data, enforce data privacy, and monitor for security incidents and compliance deviations.
View this webcast on-demand to learn all about Assure Security, including:
• How Syncsort’s security brands have come together in Assure Security
• How Assure Security automates security best practices and satisfies regulatory requirements
• How Syncsort can help you control access to IBM i systems and prevent data breaches
Domain 3: Security Engineering
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
History of Cryptography
Types of Cryptography
Cryptographic Attacks
Implementing Cryptography
360-Degree View of IT Infrastructure with IT Operations AnalyticsPrecisely
IT operations analytics (ITOA) is instrumental in helping companies lower cost and increase efficiency within their IT infrastructure. Yet in today’s multi-platform environments, companies struggle to bring mainframe and IBM i data into these views.
Syncsort Ironstream enables critical SMF records, logs and other machine data in your z/OS and IBM i environments to be streamed and correlated with data from the rest of your enterprise in near real-time within Splunk or Elastic, turning machine data into operational analytics and providing valuable insights.
View this 15-minute webinar on-demand to learn how to get full visibility into your entire web-based application infrastructure to enable faster and easier problem resolution.
IBM i is securable BUT not secured by default. To help protect your organization from the increasing security threats, you must take control of all access points to your IBM i server. You can limit IBM i security threats by routinely assessing your risks and taking control of logon security, powerful authorities, and system access.
With the right tools and process, you can assure comprehensive control of unauthorized access and can trace any activity, suspicious or otherwise, on your IBM i systems.
Watch this on-demand webcast to learn:
• How to secure network access and communication ports
• How to implement different authentication options and tradeoffs
• How to limit the number of privileged user accounts
• How Precisely’s Assure Security can help
Taking Control of Access to Your IBM i Systems and DataPrecisely
The days when the IBM i was isolated from other systems and configuring security was a relatively simple matter are long gone. As the IBM i has become interconnected with other systems, the way in which it can be accessed have grown – and the task of protecting it from intrusion has become more complex. To ensure the security of your organization’s critical data and applications, and to comly with increasingly strict IT security regulations, you must control the numerous means by which your IBM i systems can be accessed.
Watch this 15-minute webcast to learn how exit points provided by the IBM i OS can be used to monitor and secure access to IBM i systems and data.
Eliminate the Impact of Planned Downtime on your IBM iPrecisely
You depend on your IBM i systems to always be available. Yet maintenance is inevitable. Eventually, you will have to upgrade or replace outdated technologies or swap in a higher performance server to manage a greater volume of business. Additionally, over time, IBM i data files can include excessive wasted space as the storage occupied by logically deleted records is not released for re-use. Freeing that space may require unpredictably long system outages that can be unacceptable for many organizations.
The demands of today’s 24-7 business will not allow for large periods of downtime. Precisely can help you dramatically reduce or even eliminate the downtime you may experience with these sorts of challenges.
Join us to learn how to eliminate downtime for:
• Migrating to a new IBM i system or to the cloud
• Identifying and minimizing wasted space on IBM i production servers
• Implementing Encrypt While Active
Social Distance Your IBM i from Cybersecurity RiskPrecisely
The continuous news of personal information stolen from major retailers and financial institutions have driven consumers and regulatory bodies to demand that more action be taken to ensure data protection and privacy. Regulations such as PCI DSS, HIPAA, GDPR, and FISMA require that personal data be protected against unauthorized access using technologies like encryption, tokenization, masking, secure file transfer and more. With all the options available for securing IBM i data at rest and in motion, how do you know where to begin?
Register to get up to speed on the key concepts you need to know about assuring data privacy for your customers, business partners and employees.
Topics will include:
- Protecting data with encryption and the need for strong key management
- Use Cases that are best for tokenization
- Options for permanently deidentifying data
- Securing data in motion across networks
- Complete security solution for IBM I (AS/400)
Similar to Essential Layers of IBM i Security: IBM i Security Configuration (20)
AI-Ready Data - The Key to Transforming Projects into Production.pptxPrecisely
Moving AI projects from the laboratory to production requires careful consideration of data preparation. Join us for a fireside chat where industry experts, including Antonio Cotroneo (Director, Product Marketing, Precisely) and Sanjeev Mohan (Principal, SanjMo), will discuss the crucial role of AI-ready data in achieving success in AI projects. Gain essential insights and considerations to ensure your AI solutions are built on a solid foundation of accurate, consistent, and context-rich data. Explore practical insights and learn how data integrity drives innovation and competitive advantage. Transform your approach to AI with a focus on data readiness.
Building a Multi-Layered Defense for Your IBM i SecurityPrecisely
In today's challenging security environment, new vulnerabilities emerge daily, leaving even patched systems exposed. While IBM works tirelessly to release fixes as they discover vulnerabilities, bad actors are constantly innovating. Don't settle for reactive defense – secure your IT with a layered approach!
This holistic strategy builds multiple security walls, making it far harder for attackers to breach your defenses. Even if a certain vulnerability is exploited, one of the controls could stop the attack or at least delay it until you can take action.
Join us for this webcast to hear about:
• How security risks continue to evolve and change
• The importance of keeping all your systems patched an up-to-date
• A multi-layered approach to network, system object and data security
Navigating the Cloud: Best Practices for Successful MigrationPrecisely
In today's digital landscape, migrating workloads and applications to the cloud has become imperative for businesses seeking scalability, flexibility, and efficiency. However, executing a seamless transition requires strategic planning and careful execution. Join us as we delve into the insightful insights around cloud migration, where we will explore three key topics:
i. Considerations to take when planning for cloud migration
ii. Best practices for successfully migrating to the cloud
iii. Real-world customer stories
Unlocking the Power of Your IBM i and Z Security Data with Google ChroniclePrecisely
In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolated, hindering your ability to detect and respond to threats effectively.
Ironstream and bridge this gap for IBM systems by integrating the important security data from these mission-critical systems into Google Chronicle where it can be seen, analyzed and correlated with the data from other enterprise systems Here's what you'll learn:
• The unique challenges of securing IBM i and Z mainframes
• Why traditional security tools fall short for mainframe data
• The power of Google Chronicle for unified security intelligence
• How to gain comprehensive visibility into your entire IT ecosystem
• Real-world use cases for integrating IBM i and Z security data with Google Chronicle
Join us for this webcast to hear about:
• The unique challenges of securing IBM i and IBM Z systems
• Real-world use cases for integrating IBM i and IBM Z security data with Google Chronicle
• Combining Ironstream and Google Chronicle to deliver faster threat detection, investigation, and response times
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Are you considering leveraging the cloud alongside your existing IBM AIX and IBM I systems infrastructure? There are likely benefits to be realized in scalability, flexibility and even cost.
However, to realize these benefits, you need to be aware of the challenges and opportunities that come with integrating your IBM Power Systems in the cloud. These challenges range from data synchronization to testing to planning for fallback in the event of problems.
Join us for this webcast to hear about:
• Seamless migration strategies
• Best practices for operating in the cloud
• Benefits of cloud-based HA/DR for IBM AIX and IBM i
It can be challenging display and share capacity data that is meaningful to end users. There is an overabundance of data points related to capacity, and the summarization of this data is difficult to construct and display.
You are already spending time and money to handle the critical need to manage systems capacity, performance and estimate future needs. Are you it spending wisely? Are you getting the level of results from your investment that you really need? Can you prove it?
The good news is that the return on investment of implementing capacity management and capacity planning is most definitely positive and provable, both in terms of tangible monetary value and in some less tangible but no-less-valuable benefits.
Join us for this webinar and learn:
• Top Trends in Capacity Management
• Common customer pain points
• Ways to demonstrate these benefits to your company
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
Ready to improve efficiency, provide easy to use data automations and take materials master (MM) data maintenance to the next level?
Find out how during our Automate Studio training on March 28 – led by Sigrid Kok, Principal Sales Engineer, and Isra Azam, Sales Engineer, at Precisely.
This session’s for you if you want to discover the best approaches for creating, extending or maintaining different types of materials, as well as automating the tricky parts of these processes that slow you down.
Greater control over your Automate Studio business processes means bigger, better results. We’ll show you how to enable your business users to interact with SAP from Microsoft Office and other familiar platforms – resulting in more efficient SAP data management, along with improved data integrity and accuracy.
This 90-minute session will be filled with a variety of topics, including:
real world approaches for creating multiple types of materials, balancing flexibility and power with simplicity and ease of use
tips on material creation, including
downloading the generated material number
using formulas to format prior to upload, such as capitalization or zero padding to make it easy to get the data right the first time
conditionally require fields based on other field entries
using LOV for fields that are free form entry for standard values
tips on modifying alternate units of measure, building from scratch using GUI scripting
modify multiple language descriptions, build from scratch using a standard BAPI
make end-to-end MM process flows more of a reality with features including APIs and predictive AI
Through these topics, you’ll gain plenty of actionable takeaways that you can start implementing right away – including how to:
improve your data integrity and accuracy
make scripts flexible and usable for automation users
seamlessly handle both simple and complex parts of material master
interact with SAP from both business user and script developers’ perspectives
easily upload and download data between SAP and Excel – and how to format the data before upload using simple formulas
You’ll leave this session feeling ready and empowered to save time, boost efficiency, and change the way you work.
Automate Studio reduces your dependency on technical resources to help you create automation scenarios – and our team of experts is here to make sure you get the most out of our solution throughout the journey.
Questions? Sigrid & Isra will be ready to answer them during a live Q&A at the end of the session.
Who should attend:
Attendees who will get the most out of this session are Automate Studio developers and runners familiar with SAP MM. Knowledge of Automate Studio script creation is nice to have, but not required.
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
Join us for an insightful roundtable discussion featuring experts from AWS, Confluent, and Precisely as they delve into the complexities and opportunities of migrating mainframe data to the cloud.
In this engaging webinar, participants will learn about the various considerations, strategies, and customer challenges associated with replicating mainframe data to cloud environments.
Our panelists will share practical insights, real-world experiences, and best practices to help organizations successfully navigate this transformative journey.
Whether you're considering migrating and modernizing your mainframe applications to cloud, or augmenting mainframe-based applications with data replication to cloud, this roundtable will provide valuable perspectives and insights to maximize the benefits of migrating mainframe data to the cloud.
Join us on March 27 to gain a deeper understanding of the opportunities and challenges in this evolving landscape.
Data Innovation Summit: Data Integrity TrendsPrecisely
Data integrity remains an evolving process of discovery, identification, and resolution. With an all-time low in public confidence on data being used for decision-making, attention has gradually shifted to data quality and data integration across multiple systems and frameworks. Data integrity becomes a focal point again for companies to make strategic moves in a world facing an evolving economy.
Key takeaways:
· How to build a data-driven culture within your organization
· Tips to engage with key stakeholders in your business and examples from other businesses around the world
· How to establish and maintain a business-first approach to data governance
· A summary of the findings from a recent survey of global data executives by Drexel University's LeBow College of Business
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
Artificial Intelligence (AI) has become a strategic imperative in a rapidly evolving business landscape. However, the rush to embrace AI comes with risks, as illustrated by instances of AI-generated content with fake citations and potentially dangerous recommendations. The critical factor underpinning trustworthy AI is data integrity, ensuring data is accurate, consistent, and full of rich context.
Attend our upcoming webinar, "AI You Can Trust: Ensuring Success with Data Integrity," as we explore organizational challenges in maintaining data integrity for AI applications and real-world use cases showcasing the transformative impact of high-integrity data on AI success.
During this panel discussion, we'll highlight everything from personalized recommendations and AI-powered workflows to machine learning applications and innovative AI assistants.
Key Topics:
AI Use Cases with Data Integrity: Discover how data integrity shapes the success of AI applications through six compelling use cases.
Solving AI Challenges: Uncover practical solutions to common AI challenges such as bias, unreliable results, lack of contextual relevance, and inadequate data security.
Three Considerations of Data Integrity for AI: Learn the essential pillars—complete, trusted, and contextual—that underpin data integrity for AI success.
Precisely and AWS Partnership: Explore how the collaboration between Precisely and Amazon Web Services (AWS) addresses these challenges and empowers organizations to achieve AI-ready data.
Join our panelists to unlock the full potential of AI by starting your data integrity journey today. Trust in AI begins with trusted data – let's future-proof your AI together.
Less Bias. More Accurate. Relevant Outcomes.
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
La fonction finance est au cœur du succès de l’entreprise, et doit aussi évoluer pour faire face aux enjeux d’aujourd’hui : aller plus vite, traiter plus d’informations et assurer une qualité des données sans faille.
Nous vous proposons de découvrir ensemble comment répondre à ces défis, notamment les points suivants :
Gérer les référentiels comptables et financiers, comptes comptables, clients, fournisseurs, centres de couts, centres de profits…Accélérer les clôtures et permettre de passer les écritures comptables nécessaires, de lancer les rapports adéquats et d’extraire les informations en temps réelOrganiser les taches en les affectant de manière ordonnancée à leurs responsables ou en les lançant automatiquement et les suivre de manière granulaire
Notre webinaire sera l’occasion d’évoquer et d’illustrer cette palette de capacités disponibles pour des utilisateurs métier sans code ou avec peu de code et nous vous espérons nombreux.
In dieser Präsentation diskutieren wir, welche Tools aus unserer Sicht dabei helfen, die Transformation zu SAP S/4HANA optimal zu gestalten. Aber wir blicken auch nach vorne!
In unserem Beitrag fokussieren wir uns nicht nur auf kurzfristige Lösungen, sondern es geht auch um das Thema „Nachhaltigkeit“. Um Investitionen für die Zukunft.
Dazu gehören Entwicklungen, die die SAP Welt nachhaltig verändern werden.
Wir betrachten zukünftige Technologien, wie KI oder Machine Learning, die dazu beitragen, datenintensive SAP Prozesse zu optimieren, die Datenqualität zu verbessern, manuelle Prozesse zu reduzieren und Mitarbeiter zu entlasten.
Werfen Sie mit uns einen Blick in die Zukunft und gestalten Sie die digitale Transformation in Ihrem Unternehmen mit.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
How world-class product teams are winning in the AI era by CEO and Founder, P...
Essential Layers of IBM i Security: IBM i Security Configuration
1. Layers of Security
IBM i Security Configuration
Rich Marko – Professional Services Director
Bill Hammond – Sr, Product Marketing Manager
2. Housekeeping
Webinar Audio
• Today’s webinar audio is streamed through your computer
speakers
• If you need technical assistance with the web interface or audio,
please reach out to us using the Q&A box
Questions Welcome
• Submit your questions at any time during the presentation using
the Q&A box
Recording and slides
• This webinar is being recorded. You will receive an email following
the webinar with a link to the recording and slides
3. Today’s Agenda
• Layers of Security Overview
• IBM i Security Configuration
• System values settings
• IBM i server-configuration settings
• System Services Tools (SST) settings
• User authority settings
• Staying current on OS releases and
PTFs
• Q & A
3
5. IBM i Security
Configuration
Proper configuration
of the IBM i OS and related
resources, as well as
keeping OS versions and
PTFs up to date.
5
6. IBM i Security Configuration
3
System Services
Tools (SST)
settings
2
IBM i server-
configuration
settings
1
System values
settings
4
User authority
settings
6
5
Staying current on
OS releases and
PTFs
8. System values settings
8
• The QSECURITY system value is used to specify the security
level of the OS
• Must be set to 40 or 50.
• Activates system-integrity protection for your IBM i
• Object-domain checking
• Parameter validation
• Object-hardware storage protection
• Prevent direct access to objects
• Ensures user-written programs utilize system interfaces (commands
and APIs) in order to gain access to objects
• Decide whether to enable QALWOBJRST, QFRCCVNRST,
QVFYOBJRST, and other system values related to integrity
and security.
10. IBM i server-configuration
settings
10
• Numerous servers on IBM i allow a client system to connect
over a network
• FTP
• TELNET
• ODBC
• JDBC
• DRDA
• Sign-on server, and many others
• Starting all servers by default on an IBM i unnecessarily opens
“doors” into the system,
• Review all IBM i servers
• Deactivate any that aren’t needed.
12. System Services Tools (SST)
settings
12
• Many SST capabilities provide significant access to data
• Network trace tools can provide a view of data flowing over a
network
• Manage or view storage dumps
• Manage other service tools User IDs
• Limit number of users having SST access
14. User authority settings
14
• Many companies have too many users with powerful profiles
• *SECADM authority
• *ALLOBJ authority
• Command-line access
• Stop the spread of powerful profiles
• Assign limited privileges to the majority of user profiles
• Temporarily grant selected users the authority they need to do a task
• Utilize third-party solutions
• Make it easier for administrators, security officers, and end users to
temporarily obtain elevated privileges as required.
• Log all actions taken once a user has the temporarily elevated authority
16. Staying current on OS releases
and PTFs
16
• Running older releases of the IBM i OS can open a security
risk within an enterprise.
• Risk from open-source packages that are no longer supported
by the open-source community but that run on systems with
older IBM i OS release levels.
• Java
• OpenSSL/SSH
• Samba
• Lotus products
• Web and application servers
• Subscribe to IBM’s security bulletins and tech notes for IBM i
17. Top Takeaways
• For QSECURITY system value, you should be
at security level 40 or 50
• Deactivate any IBM i servers not in use
• Take care with access to System Service Tool
capabilities
• Limit Powerful Profiles on your system
• Stay up-to-date with IBM i OS PTFs
17
19. Download the White Paper
The six layers of IBM i security and how
Precisely can help
19
https://www.precisely.com/resource-center/whitepapers/the-essential-
layers-of-ibm-i-security
20. Layers of Security Webinar Series
20
Topic 1 Topic 2 Topic 3
access on Resource Center today
Topic 5 Topic 6Topic 4
register now!
The increased frequency of high-profile breaches and the corresponding rise of new and expanded regulatory compliance requirements is putting enormous pressure on IT departments to assure their corporate executives that business-critical systems and data are secure. One particular statistic from a recently conducted Precisely survey of IT professionals is revealing in that 69% of respondents said they were only “somewhat confident” (or worse) in the effectiveness of their company’s IT security program. Given today’s rapidly evolving security threats, even being “somewhat confident” doesn’t cut it.
Improving confidence in one’s IT security posture requires a solid understanding of all potential vulnerabilities as well as the most effective best practices and technologies in order to minimize the possibility of a breach. To help, Precisely has created this white paper as a roadmap, grouping together important security best practices and technologies into six primary categories or “layers.” These layers cover physical devices, networks, configuration of the IBM i OS, access to systems, protection of data at the file and field level, and monitoring and auditing of systems. The reason it’s particularly helpful to view these security categories as “layers” is that, to some extent, each category overlaps with the others to provide multiple lines of defense. In other words, should one security layer be somehow compromised, there’s a good chance that another layer will thwart a would-be intruder. The six layers of IBM i security are summarized in the following diagram and are detailed in the remainder of this white paper
QALWOBJRST – Allow object restore option
QVFYOBJRST – Verify object on restore
QFRCCVNRST - Force conversion on restore
QVFYOBJRST=3, QFRCCVNRST=3, and QALWOBJRST=*ALWPTF or *NONE work together.
WRKSYSVAL SYSVAL(*SEC) for the entire list
Use the ANZDFTPWD command to check for default passwords
Create the QAUDJRN audit journal - CHGSECAUD
ENDTCPSVR
ENDHOSTSVR
NETSTAT – Option 3 or 4 to see Listening Ports
3rd party tools are available to monitor and secure
DSPSSTUSR (Display Service Tool User CL command)
Command line interface to “audit” service tool users and privileges
STRSST (Start System Service Tools command)
Command line interface to the System Service tool menu
Create as few Service Tools User IDs (SST/DST) as possible
Create a Service Tool user with the same privileges as QSECOFR (QSECOFR can become disabled)
Never use QSECOFR Service Tool USERID (save the password in a secure location)
*SECOFR Class User Profiles
Audit powerful profiles with CHGUSRAUD command
In OS 7.3, IBM added Authority Collection that can be used to determine what security a user needs
DSPPTF/WRKPTF
QAUDJRN now has *PTFOBJ – Changes to PTF objects and *PTFOPR – PTF Operations
The increased frequency of high-profile breaches and the corresponding rise of new and expanded regulatory compliance requirements is putting enormous pressure on IT departments to assure their corporate executives that business-critical systems and data are secure. One particular statistic from a recently conducted Precisely survey of IT professionals is revealing in that 69% of respondents said they were only “somewhat confident” (or worse) in the effectiveness of their company’s IT security program. Given today’s rapidly evolving security threats, even being “somewhat confident” doesn’t cut it.
Improving confidence in one’s IT security posture requires a solid understanding of all potential vulnerabilities as well as the most effective best practices and technologies in order to minimize the possibility of a breach. To help, Precisely has created this white paper as a roadmap, grouping together important security best practices and technologies into six primary categories or “layers.” These layers cover physical devices, networks, configuration of the IBM i OS, access to systems, protection of data at the file and field level, and monitoring and auditing of systems. The reason it’s particularly helpful to view these security categories as “layers” is that, to some extent, each category overlaps with the others to provide multiple lines of defense. In other words, should one security layer be somehow compromised, there’s a good chance that another layer will thwart a would-be intruder. The six layers of IBM i security are summarized in the following diagram and are detailed in the remainder of this white paper