SlideShare a Scribd company logo
1 of 49
Download to read offline
Syncsort’s Latest Innovations
in IBM i Security
Becky Hjellming
Product Marketing Director
Genyphyr Novak
Senior Consultant
Housekeeping
Webcast Audio
• Today’s webcast audio is streamed through your computer speakers.
• If you need technical assistance with the web interface or audio,
please reach out to us using the chat window.
Questions Welcome
• Submit your questions at any time during the presentation
using the chat window.
• We will answer them during our Q&A session following the
presentation.
Recording and slides
• This webcast is being recorded. You will receive an
email following the webcast with a link to download
both the recording and the slides.
Topics
• Syncsort’s Security portfolio today
• New multi-factor authentication for IBM i
• New Cilasoft 5.33 release
• New Enforcive 8.3.03 release
• Learn more
• Q&A
3
Security Solutions
from Syncsort
Syncsort’s Security Portfolio
Security
Cilasoft
Cilasoft Compliance
and Security Suite
QJRN/400
QJRN Database & QJRN System
CONTROLER
EAM
RAMi
CENTRAL
Alliance
Alliance
AES/400
Townsend’s Alliance
Key Manager
Alliance Token
Manager
Alliance
FTP Manager
Alliance
XML/400
Alliance
LogAgent Suite
Alliance Two Factor
Authentication
Enforcive
Enterprise Security
Suite
Security Risk
Assessment
Cross-Platform Audit
Cross-Platform
Compliance
Password Self-Service
AIX Security
Quick
Quick-CSi
Quick-Anonymizer
5
Syncsort’s portfolio of
Security solutions has grown
through acquisition.
Today Syncsort’s Security
product line has the breadth
and depth to meet nearly
any compliance or security
need.
SIEM Integration
Ensure IBM i security activity can
be fed into an enterprise security
monitoring console
Fraud
Detection/Prevention
Ensure comprehensive control of
unauthorized access and the
ability to trace any activity,
suspicious or otherwise
Compliance
Prove to auditors that access is
controlled and the system is in
compliance
There are 3 broad
categories of security
& compliance needs
6
Security Risk Assessment
Security Risk
Assessment Tool
Security Risk
Assessment Service
Syncsort
Security
Solutions
7
Security Risk
Assessment
Compliance Acceleration
Cilasoft
QJRN/400
Enforcive
Policy Compliance,
Compliance Accelerator,
Cross-Platform
Compliance
Syncsort
Security
Solutions
8
Security Risk
Assessment
Compliance
Acceleration
Sensitive Data Protection Syncsort
Security
Solutions
Alliance AES/400,
Townsend Alliance Key Manager,
Alliance Token Manager
Enforcive
Field Encryption
Quick-Anonymizer
9
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
Secure Data Transfer
Alliance FTP Manager
Syncsort
Security
Solutions
10
Secure Data
Transfer
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
Multi-Factor Authentication
Cilasoft Reinforced
Authentication
Manager for i (RAMi)
Alliance Two Factor
Authentication
Syncsort
Security
Solutions
11
Secure Data
Transfer
Enhanced
Password
Management
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
Elevated Authority Management
Cilasoft Elevated
Authority Manager
(EAM)
Syncsort
Security
Solutions
12
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
Comprehensive Access Control
Cilasoft CONTROLER
Enforcive Enterprise
Security Suite
(for IBM i and for AIX)
Syncsort
Security
Solutions
13
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
Access
Control
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
System and Database Auditing
Cilasoft
QJRN/400
Enforcive
Enterprise Security Suite
(for IBM i and AIX),
Cross-Platform Audit
Quick-CSi
Syncsort
Security
Solutions
14
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
System &
Database
Auditing
Access
Control
Security Risk
Assessment
Sensitive
Data
Protection
Compliance
Acceleration
Reporting, Alerting, Log
Forwarding & SIEM Integration
Cilasoft
Security Suite
Alliance LogAgent Suite
Enforcive Security Suite
with Data Provider
Ironstream for i
Syncsort
Security
Solutions
15
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
System &
Database
Auditing
Access
Control
Security Risk
Assessment
SIEM
Integration
Alerts and
Reports
Sensitive
Data
Protection
Compliance
Acceleration
Log
Forwarding
Additional Security Tools
Cilasoft
Reinforced Authentication
Manager for i (RAMi)
Cilasoft
CENTRAL
Cilasoft
Job Log Explorer
Enforcive
Firewall Manager
Enforcive
Password Self-Service
Syncsort
Security
Solutions
16
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
System &
Database
Auditing
Access
Control
Security Risk
Assessment
SIEM
Integration
Alerts and
Reports
Sensitive
Data
Protection
Compliance
Acceleration
Log
Forwarding
Comm Port
Security
Password
Self-Service
Supervised
4-Eyes
Operations
Job Log
Analysis
Secure Data
Consolidation
&
Distribution
Flexible services offerings for security
• Security risk assessment
• Quick start services
• Quick check services
• Security update services (installing hot fixes, PTFs, new releases, etc.)
• System update services (ensuring security solution is properly configured
after system changes to IP addresses, OS versions, etc.)
• Auditor assist (supporting internal or external auditors)
• Managed security services
• A la carte consulting
Leverage Syncsort’s team of seasoned security experts!
Global Professional Services
Add Value to Your Investment
1717
Syncsort can help
with all your
compliance,
security or SIEM
integration needs!
18
Elevated
Authority
Management
Secure Data
Transfer
Enhanced
Password
Management
System &
Database
Auditing
Access
Control
Security Risk
Assessment
SIEM
Integration
Alerts and
Reports
Sensitive
Data
Protection
Compliance
Acceleration
Log
Forwarding
Comm Port
Security
Password
Self-Service
Supervised
4-Eyes
Operations
Job Log
Analysis
Secure Data
Consolidation
&
Distribution
Learn more at
www.syncsort.com/en/assure
New Multi-factor
Authentication for IBM i
• The purpose of Multi-Factor Authentication is to add a layer of
security beyond passwords or passphrases
• Multi-Factor Authentication (MFA), also known as Two Factor
Authentication (2FA), requires two of the following factors :
• Something you know (user ID, password, PIN)
• Something you have (smart phone, email, token device)
• Something you are (fingerprint, iris scan, facial image)
• Multi-Factor Authentication is a strong requirement in PCI-DSS 3.2,
HIPAA, NYDFS Cybersecurity Regulation, Swift Alliance Access, & more
• Multi-Factor Authentication relies on services such as RSA SecurID,
Twilio and Authy, Telesign, Microsoft Authenticator, Google
Authenticator, and Duo
What is Multi-Factor
Authentication?
20
Multi-Step vs.
Multi-Factor Authentication
• Multi-step authentication
• Two authentication steps are presented separately; for example a
password step followed by a security question
• If authentication fails, the user recognizes which step failed
• Multi-factor authentication
• Multiple factors of authentication are presented at the same time; for
example a password and single-use authentication token
• All factors must be validated before granting access
• If authentication fails, the user does not know which factor failed
• Not understanding multi-factor authentication failures is frustrating
for end users, but it is required by regulations such as PCI
21
✓ Adds an authentication layer above and beyond memorized or
written passwords
✓ Invokes rules-based multi-factor authentication only for users or
specific situations that require it
✓ Allows multi-factor authentication failures to be monitored from
a SIEM server
✓ Enables your organization to meet audit and regulatory
requirements and recommendations
✓ Lowers the risk of unauthorized access to systems, applications
and data
✓ Reduces the risk of data theft and its costs and consequences
Introducing Cilasoft RAMi –
Reinforced Authentication Manager for i
22
RAMi can be initiated in 3 ways:
1. Integrated multi-factor authentication in the
5250 IBM i signon screen
2. Integrated two-step authentication in the
5250 IBM i signon screen
3. On demand (manually or via a program)
Flexible Options for Initiating RAMi
Integrating multi-factor authentication into the 5250
signon screen requires modifications to subsystems
23
• RAMi’s rules engine makes it easy to configure which users or specific situations require multi-factor
authentication whether integrated into the signon screen or on-demand
• Rules criteria include whether the user is:
• registered or unregistered
• a limited capability user
• a member of specific group profiles
• in possession of special authorities
• using a specific device
• authenticating from a specific subsystem or iASP
• using a particular IP address
• authenticating at a certain date or time
• If RAMi is invoked on demand, the calling program can also be a criterion
• Pre-defined rules are provided to help you get started quickly
Powerful Rules
24
• Cilasoft authentication
• Token is transmitted by email and/or popup
• Recommended for less demanding environments where
cost is an issue
• RADIUS authentication
• RADIUS client ported natively on IBM i
• Recommended for organizations that
• Have their own RADIUS server
• Already use another solution based on RADIUS
• RSA SecurID authentication
• For most demanding environments
• RAMi is Certified with RSA SecurID
• DOC-92160 on RSA’s community site contains the RSA
SecurID Access Implementation Guide for RAMi
Supports Multiple Authentication Methods
25
•
• RAMi can also be used to grant users the ability to
• Re-enable their profiles
• Change their passwords
• If configured, users can answer pre-configured security
questions and/or receive a single-use token via pop-up,
email or RSA SecurID device
• After providing their authentication token, users can
perform their change
Self-Service Re-Enablement
& Password Changes
26
Certain actions require supervision
• Operations that could have significant impact on the server
• Changes to extremely sensitive data
RAMi supports the “four eyes principle” for supervised changes
• At the user’s request, an admin receives:
• A single-use token
• The user’s identify
• The job number
• The administrator enters the single-use token into the user’s
screen and observes the change while it is made
The Four Eyes Principle
for Supervised Changes
27
• Powerful, flexible multi-factor authentication for IBM i
• Options to initiate from the 5250 signon or on-demand
• Options for multi-factor or two-step authentication
• Provides support for multiple authentication methods
• Logs authentication failures for monitoring from a SIEM server
• Enables self-service profile re-enablement and password changes
• Supports the four eyes principle for supervised changes
• RSA certified
Strengthen IBM i Security with Cilasoft RAMi
Username:
Password:
Token Code:
Login Cancel
28
RAMi Live Demo
RAMi Customer Story
• US-based life insurance
company subject to New York
Department of Financial
Services Cybersecurity
Regulation (23 NYCRR 500)
• Failed compliance audit
• Directive to implement multi-
factor authentication from the
IBM i signon screen
Challenge Technical Environment Solution
• Some users have RSA tokens
and others do not
• Use Enforcive product to
address other security needs
• Cilasoft RAMi
• Secures Telnet signon
• Cilasoft and RSA SecurID
authentication methods
• Rules configured for
• On-demand, one-time tokens
by email for most users
• RSA authentication for
remote users
30
Cilasoft RAMi or Alliance 2FA –
Which Fits Your Needs?
31
Capability Cilasoft RAMi Alliance Two Factor Authentication
Certification RSA NIST
Supported authenticators 1. Cilasoft method
2. RADIUS servers
3. RSA SecureID servers or cloud service
Twilio’s Authy voice & mobile
Ability to integrate with programs or
workflow
Yes Yes
Configurable by user or situation Yes, extensive rules-based configuration Yes, detects high privilege users
Failure results Optional profile disablement on failure Optional profile disablement on failure
Profile and password self-service Yes No
New Releases
Enforcive 8.3.03
33
• FCS – July 24; Target GA – August 28
• New GDPR compliance acceleration
• Enhancements delivered in three modules
• Compliance – Predefined GDPR templates
• Report Generator – Predefined GDPR reports
• Alert Center – Predefined alerts for GDPR
• New predefined templates, alerts, and reports for GDPR compliance
Enforcive 8.3.03
34
• FCS – July 24; Target GA – August 28
• New GDPR compliance acceleration
• COMPLIANCE - New Object Authority commands for managing compliance templates
• Commands allow user to add, update and delete an object authority template
• Commands will create a template if it doesn’t exist, or update an existing template
Enforcive 8.3.03
35
• FCS – July 24; Target GA – August 28
• New GDPR compliance acceleration
• COMPLIANCE - New Object Authority commands for managing compliance templates
• SIEM INTEGRATION - System Audit Data Provider now supports all action type journal codes
• ENCRYPTION - Field Encryption and Field Security can now encrypt fields of up to 4,000 characters
• ENCRYPTION - The maximum number of field registry entries has been increased to 32,000
• ACCESS CONTROL - New SWPONT command enables account swapping with a specified user
• Many additional customer requests, fixes and enhancements
Enforcive 8.3.03
36
Cilasoft 5.33
37
• GA – targeted for late August
• New automatic report creation
• Cilasoft QJRN/400 produces clear, easy-to-read reports from IBM journals
• A new fully automatic report type is available in QJRN/400 in version 5.33
• Administrators pick a file, pick the format, and the report is done
• QJRN/400 automates the task of finding the important fields and changes
Cilasoft 5.33 Enhancements
38
• GA – targeted for mid-August
• New automatic report creation
• New GDPR models and scripts
• Cilasoft QJRN/400 5.33 makes it easier to become GDPR compliant and maintain compliance
• New models and scripts report on deviations against the best practices required by GDPR
• Administrators simply supply the list of files that need to be audited
Cilasoft 5.33 Enhancements
39
• GA – targeted for mid-August
• New automatic report creation
• New GDPR models and scripts
• Enhanced categorization of security events in SIEM consoles
• Events from IBM i security vendors appear generic when sent to SIEM consoles
• Cilasoft modules now map events to specific QRadar categories to simplifying monitoring
Cilasoft 5.33 Enhancements
40
• GA – targeted for mid-August
• New automatic report creation
• New GDPR models and scripts
• Enhanced categorization of security events in SIEM consoles
• Minor enhancements
• Temp keys are no longer calculated at installation time
• New command (DSPQSSTS) tells you if a job is currently using elevated authority
• EAM can log the activity of a batch job
• EAM can end ODBC jobs if an EAM job remains active after a configured number of warning messages is met
• The list of sources covered by System Examiner has been expanded (network attributes and program details
are now covered)
Cilasoft 5.33 Enhancements
41
How to
Learn More
Syncsort’s Security Webinars
43
Date Title
On-Demand GDPR & IBM i Security
On-Demand Top Ten Tips for IBM i Security & Compliance [Guest speaker: Dan Riehl]
On-Demand Top 5 Encryption Myths for IBM i Users [Guest speaker: Patrick Townsend]
On-Demand Accelerating Regulatory Compliance for IBM i Systems
On-Demand Taking Control of Access to Your IBM i Systems and Data
August 20 Securing IBM i User Profiles
August 27 Detecting Fraudulent Activity on Your IBM i
September 14 Securing Sensitive IBM i Data At-Rest and In-Motion
September 28 Assessing IBM i Security Risks
September 25
Does your IBM i Security Meet the Bar for GDPR?
Learn How to Put Effective Compliance Measures in Place
Syncsort’s Latest Security eBooks
“Passing Your Next Audit: The Challenges of Properly
Securing Your IBM i and Maintaining Compliance”
“Three Imperatives for Keeping IBM i Environments in
Compliance with GDPR”
“Four Powerful Ways Exit Points Can Be Used to Secure
IBM i Access”
Coming Soon!
“Multi-Factor Authentication for IBM i—a Primer”
44
What’s Next?
Stay Tuned
• Enhancements planned for all brands
• Usability enhancements
• Customer requests
• More compliance modules
• Products will be brought into a common framework
• Common install process
• Common status dashboard
• Tighter integration with Syncsort HA
• Integration of Security with HA switch processes
• Shared status dashboard
• Stay tuned for more announcements!
46
Recap
✓ Syncsort has grown a broad and deep Security
portfolio through acquisition
✓ Cilasoft RAMi is now available for multi-factor
authentication
✓ New releases for Enforcive and Cilasoft products
✓ Many opportunities to learn more
✓ Stay tuned for more announcements on
Syncsort Security
Q&A
Learn more at
www.syncsort.com/en/assure
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Releases

More Related Content

What's hot

Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Blue Teamer
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 

What's hot (20)

Novinky F5
Novinky F5Novinky F5
Novinky F5
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Novinky F5 pro rok 2018
Novinky F5 pro rok 2018Novinky F5 pro rok 2018
Novinky F5 pro rok 2018
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 

Similar to Increase IBM i Security & Accelerate Compliance with New Syncsort Security Releases

Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudHostway|HOSTING
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationPrecisely
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudNeelkamal Gaharwar
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 

Similar to Increase IBM i Security & Accelerate Compliance with New Syncsort Security Releases (20)

Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security Integration
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 

More from Precisely

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 

More from Precisely (20)

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Increase IBM i Security & Accelerate Compliance with New Syncsort Security Releases

  • 1. Syncsort’s Latest Innovations in IBM i Security Becky Hjellming Product Marketing Director Genyphyr Novak Senior Consultant
  • 2. Housekeeping Webcast Audio • Today’s webcast audio is streamed through your computer speakers. • If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome • Submit your questions at any time during the presentation using the chat window. • We will answer them during our Q&A session following the presentation. Recording and slides • This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides.
  • 3. Topics • Syncsort’s Security portfolio today • New multi-factor authentication for IBM i • New Cilasoft 5.33 release • New Enforcive 8.3.03 release • Learn more • Q&A 3
  • 5. Syncsort’s Security Portfolio Security Cilasoft Cilasoft Compliance and Security Suite QJRN/400 QJRN Database & QJRN System CONTROLER EAM RAMi CENTRAL Alliance Alliance AES/400 Townsend’s Alliance Key Manager Alliance Token Manager Alliance FTP Manager Alliance XML/400 Alliance LogAgent Suite Alliance Two Factor Authentication Enforcive Enterprise Security Suite Security Risk Assessment Cross-Platform Audit Cross-Platform Compliance Password Self-Service AIX Security Quick Quick-CSi Quick-Anonymizer 5 Syncsort’s portfolio of Security solutions has grown through acquisition. Today Syncsort’s Security product line has the breadth and depth to meet nearly any compliance or security need.
  • 6. SIEM Integration Ensure IBM i security activity can be fed into an enterprise security monitoring console Fraud Detection/Prevention Ensure comprehensive control of unauthorized access and the ability to trace any activity, suspicious or otherwise Compliance Prove to auditors that access is controlled and the system is in compliance There are 3 broad categories of security & compliance needs 6
  • 7. Security Risk Assessment Security Risk Assessment Tool Security Risk Assessment Service Syncsort Security Solutions 7 Security Risk Assessment
  • 8. Compliance Acceleration Cilasoft QJRN/400 Enforcive Policy Compliance, Compliance Accelerator, Cross-Platform Compliance Syncsort Security Solutions 8 Security Risk Assessment Compliance Acceleration
  • 9. Sensitive Data Protection Syncsort Security Solutions Alliance AES/400, Townsend Alliance Key Manager, Alliance Token Manager Enforcive Field Encryption Quick-Anonymizer 9 Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 10. Secure Data Transfer Alliance FTP Manager Syncsort Security Solutions 10 Secure Data Transfer Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 11. Multi-Factor Authentication Cilasoft Reinforced Authentication Manager for i (RAMi) Alliance Two Factor Authentication Syncsort Security Solutions 11 Secure Data Transfer Enhanced Password Management Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 12. Elevated Authority Management Cilasoft Elevated Authority Manager (EAM) Syncsort Security Solutions 12 Elevated Authority Management Secure Data Transfer Enhanced Password Management Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 13. Comprehensive Access Control Cilasoft CONTROLER Enforcive Enterprise Security Suite (for IBM i and for AIX) Syncsort Security Solutions 13 Elevated Authority Management Secure Data Transfer Enhanced Password Management Access Control Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 14. System and Database Auditing Cilasoft QJRN/400 Enforcive Enterprise Security Suite (for IBM i and AIX), Cross-Platform Audit Quick-CSi Syncsort Security Solutions 14 Elevated Authority Management Secure Data Transfer Enhanced Password Management System & Database Auditing Access Control Security Risk Assessment Sensitive Data Protection Compliance Acceleration
  • 15. Reporting, Alerting, Log Forwarding & SIEM Integration Cilasoft Security Suite Alliance LogAgent Suite Enforcive Security Suite with Data Provider Ironstream for i Syncsort Security Solutions 15 Elevated Authority Management Secure Data Transfer Enhanced Password Management System & Database Auditing Access Control Security Risk Assessment SIEM Integration Alerts and Reports Sensitive Data Protection Compliance Acceleration Log Forwarding
  • 16. Additional Security Tools Cilasoft Reinforced Authentication Manager for i (RAMi) Cilasoft CENTRAL Cilasoft Job Log Explorer Enforcive Firewall Manager Enforcive Password Self-Service Syncsort Security Solutions 16 Elevated Authority Management Secure Data Transfer Enhanced Password Management System & Database Auditing Access Control Security Risk Assessment SIEM Integration Alerts and Reports Sensitive Data Protection Compliance Acceleration Log Forwarding Comm Port Security Password Self-Service Supervised 4-Eyes Operations Job Log Analysis Secure Data Consolidation & Distribution
  • 17. Flexible services offerings for security • Security risk assessment • Quick start services • Quick check services • Security update services (installing hot fixes, PTFs, new releases, etc.) • System update services (ensuring security solution is properly configured after system changes to IP addresses, OS versions, etc.) • Auditor assist (supporting internal or external auditors) • Managed security services • A la carte consulting Leverage Syncsort’s team of seasoned security experts! Global Professional Services Add Value to Your Investment 1717
  • 18. Syncsort can help with all your compliance, security or SIEM integration needs! 18 Elevated Authority Management Secure Data Transfer Enhanced Password Management System & Database Auditing Access Control Security Risk Assessment SIEM Integration Alerts and Reports Sensitive Data Protection Compliance Acceleration Log Forwarding Comm Port Security Password Self-Service Supervised 4-Eyes Operations Job Log Analysis Secure Data Consolidation & Distribution Learn more at www.syncsort.com/en/assure
  • 20. • The purpose of Multi-Factor Authentication is to add a layer of security beyond passwords or passphrases • Multi-Factor Authentication (MFA), also known as Two Factor Authentication (2FA), requires two of the following factors : • Something you know (user ID, password, PIN) • Something you have (smart phone, email, token device) • Something you are (fingerprint, iris scan, facial image) • Multi-Factor Authentication is a strong requirement in PCI-DSS 3.2, HIPAA, NYDFS Cybersecurity Regulation, Swift Alliance Access, & more • Multi-Factor Authentication relies on services such as RSA SecurID, Twilio and Authy, Telesign, Microsoft Authenticator, Google Authenticator, and Duo What is Multi-Factor Authentication? 20
  • 21. Multi-Step vs. Multi-Factor Authentication • Multi-step authentication • Two authentication steps are presented separately; for example a password step followed by a security question • If authentication fails, the user recognizes which step failed • Multi-factor authentication • Multiple factors of authentication are presented at the same time; for example a password and single-use authentication token • All factors must be validated before granting access • If authentication fails, the user does not know which factor failed • Not understanding multi-factor authentication failures is frustrating for end users, but it is required by regulations such as PCI 21
  • 22. ✓ Adds an authentication layer above and beyond memorized or written passwords ✓ Invokes rules-based multi-factor authentication only for users or specific situations that require it ✓ Allows multi-factor authentication failures to be monitored from a SIEM server ✓ Enables your organization to meet audit and regulatory requirements and recommendations ✓ Lowers the risk of unauthorized access to systems, applications and data ✓ Reduces the risk of data theft and its costs and consequences Introducing Cilasoft RAMi – Reinforced Authentication Manager for i 22
  • 23. RAMi can be initiated in 3 ways: 1. Integrated multi-factor authentication in the 5250 IBM i signon screen 2. Integrated two-step authentication in the 5250 IBM i signon screen 3. On demand (manually or via a program) Flexible Options for Initiating RAMi Integrating multi-factor authentication into the 5250 signon screen requires modifications to subsystems 23
  • 24. • RAMi’s rules engine makes it easy to configure which users or specific situations require multi-factor authentication whether integrated into the signon screen or on-demand • Rules criteria include whether the user is: • registered or unregistered • a limited capability user • a member of specific group profiles • in possession of special authorities • using a specific device • authenticating from a specific subsystem or iASP • using a particular IP address • authenticating at a certain date or time • If RAMi is invoked on demand, the calling program can also be a criterion • Pre-defined rules are provided to help you get started quickly Powerful Rules 24
  • 25. • Cilasoft authentication • Token is transmitted by email and/or popup • Recommended for less demanding environments where cost is an issue • RADIUS authentication • RADIUS client ported natively on IBM i • Recommended for organizations that • Have their own RADIUS server • Already use another solution based on RADIUS • RSA SecurID authentication • For most demanding environments • RAMi is Certified with RSA SecurID • DOC-92160 on RSA’s community site contains the RSA SecurID Access Implementation Guide for RAMi Supports Multiple Authentication Methods 25
  • 26. • • RAMi can also be used to grant users the ability to • Re-enable their profiles • Change their passwords • If configured, users can answer pre-configured security questions and/or receive a single-use token via pop-up, email or RSA SecurID device • After providing their authentication token, users can perform their change Self-Service Re-Enablement & Password Changes 26
  • 27. Certain actions require supervision • Operations that could have significant impact on the server • Changes to extremely sensitive data RAMi supports the “four eyes principle” for supervised changes • At the user’s request, an admin receives: • A single-use token • The user’s identify • The job number • The administrator enters the single-use token into the user’s screen and observes the change while it is made The Four Eyes Principle for Supervised Changes 27
  • 28. • Powerful, flexible multi-factor authentication for IBM i • Options to initiate from the 5250 signon or on-demand • Options for multi-factor or two-step authentication • Provides support for multiple authentication methods • Logs authentication failures for monitoring from a SIEM server • Enables self-service profile re-enablement and password changes • Supports the four eyes principle for supervised changes • RSA certified Strengthen IBM i Security with Cilasoft RAMi Username: Password: Token Code: Login Cancel 28
  • 30. RAMi Customer Story • US-based life insurance company subject to New York Department of Financial Services Cybersecurity Regulation (23 NYCRR 500) • Failed compliance audit • Directive to implement multi- factor authentication from the IBM i signon screen Challenge Technical Environment Solution • Some users have RSA tokens and others do not • Use Enforcive product to address other security needs • Cilasoft RAMi • Secures Telnet signon • Cilasoft and RSA SecurID authentication methods • Rules configured for • On-demand, one-time tokens by email for most users • RSA authentication for remote users 30
  • 31. Cilasoft RAMi or Alliance 2FA – Which Fits Your Needs? 31 Capability Cilasoft RAMi Alliance Two Factor Authentication Certification RSA NIST Supported authenticators 1. Cilasoft method 2. RADIUS servers 3. RSA SecureID servers or cloud service Twilio’s Authy voice & mobile Ability to integrate with programs or workflow Yes Yes Configurable by user or situation Yes, extensive rules-based configuration Yes, detects high privilege users Failure results Optional profile disablement on failure Optional profile disablement on failure Profile and password self-service Yes No
  • 34. • FCS – July 24; Target GA – August 28 • New GDPR compliance acceleration • Enhancements delivered in three modules • Compliance – Predefined GDPR templates • Report Generator – Predefined GDPR reports • Alert Center – Predefined alerts for GDPR • New predefined templates, alerts, and reports for GDPR compliance Enforcive 8.3.03 34
  • 35. • FCS – July 24; Target GA – August 28 • New GDPR compliance acceleration • COMPLIANCE - New Object Authority commands for managing compliance templates • Commands allow user to add, update and delete an object authority template • Commands will create a template if it doesn’t exist, or update an existing template Enforcive 8.3.03 35
  • 36. • FCS – July 24; Target GA – August 28 • New GDPR compliance acceleration • COMPLIANCE - New Object Authority commands for managing compliance templates • SIEM INTEGRATION - System Audit Data Provider now supports all action type journal codes • ENCRYPTION - Field Encryption and Field Security can now encrypt fields of up to 4,000 characters • ENCRYPTION - The maximum number of field registry entries has been increased to 32,000 • ACCESS CONTROL - New SWPONT command enables account swapping with a specified user • Many additional customer requests, fixes and enhancements Enforcive 8.3.03 36
  • 38. • GA – targeted for late August • New automatic report creation • Cilasoft QJRN/400 produces clear, easy-to-read reports from IBM journals • A new fully automatic report type is available in QJRN/400 in version 5.33 • Administrators pick a file, pick the format, and the report is done • QJRN/400 automates the task of finding the important fields and changes Cilasoft 5.33 Enhancements 38
  • 39. • GA – targeted for mid-August • New automatic report creation • New GDPR models and scripts • Cilasoft QJRN/400 5.33 makes it easier to become GDPR compliant and maintain compliance • New models and scripts report on deviations against the best practices required by GDPR • Administrators simply supply the list of files that need to be audited Cilasoft 5.33 Enhancements 39
  • 40. • GA – targeted for mid-August • New automatic report creation • New GDPR models and scripts • Enhanced categorization of security events in SIEM consoles • Events from IBM i security vendors appear generic when sent to SIEM consoles • Cilasoft modules now map events to specific QRadar categories to simplifying monitoring Cilasoft 5.33 Enhancements 40
  • 41. • GA – targeted for mid-August • New automatic report creation • New GDPR models and scripts • Enhanced categorization of security events in SIEM consoles • Minor enhancements • Temp keys are no longer calculated at installation time • New command (DSPQSSTS) tells you if a job is currently using elevated authority • EAM can log the activity of a batch job • EAM can end ODBC jobs if an EAM job remains active after a configured number of warning messages is met • The list of sources covered by System Examiner has been expanded (network attributes and program details are now covered) Cilasoft 5.33 Enhancements 41
  • 43. Syncsort’s Security Webinars 43 Date Title On-Demand GDPR & IBM i Security On-Demand Top Ten Tips for IBM i Security & Compliance [Guest speaker: Dan Riehl] On-Demand Top 5 Encryption Myths for IBM i Users [Guest speaker: Patrick Townsend] On-Demand Accelerating Regulatory Compliance for IBM i Systems On-Demand Taking Control of Access to Your IBM i Systems and Data August 20 Securing IBM i User Profiles August 27 Detecting Fraudulent Activity on Your IBM i September 14 Securing Sensitive IBM i Data At-Rest and In-Motion September 28 Assessing IBM i Security Risks September 25 Does your IBM i Security Meet the Bar for GDPR? Learn How to Put Effective Compliance Measures in Place
  • 44. Syncsort’s Latest Security eBooks “Passing Your Next Audit: The Challenges of Properly Securing Your IBM i and Maintaining Compliance” “Three Imperatives for Keeping IBM i Environments in Compliance with GDPR” “Four Powerful Ways Exit Points Can Be Used to Secure IBM i Access” Coming Soon! “Multi-Factor Authentication for IBM i—a Primer” 44
  • 46. Stay Tuned • Enhancements planned for all brands • Usability enhancements • Customer requests • More compliance modules • Products will be brought into a common framework • Common install process • Common status dashboard • Tighter integration with Syncsort HA • Integration of Security with HA switch processes • Shared status dashboard • Stay tuned for more announcements! 46
  • 47. Recap ✓ Syncsort has grown a broad and deep Security portfolio through acquisition ✓ Cilasoft RAMi is now available for multi-factor authentication ✓ New releases for Enforcive and Cilasoft products ✓ Many opportunities to learn more ✓ Stay tuned for more announcements on Syncsort Security