Access Control

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
4,227
Score:
Unrated

It seems like the number of companies embracing bring-your-own-device (BYOD) policies is growing every day, with some countries seeing double digit percent growth in the number of mobile devices each year . Some people estimate  that the amount of active mobile devices (including cellular phones) will exceed the population of the earth by 2014. But…

+ read more

David Shephard
Nov 6, 2013
8:25 am
Reads:
2,981
Score:
Unrated

I’ll admit it. I’m a sci-fi geek. If a story or movie has flying saucers, aliens, or space battles-I’ve probably read it or seen it. I remember being particularly spooked by the classic 1951 film The Thing from Another  World based on a 1938 short story “Who Goes There?” What I didn’t guess was that…

+ read more

wheaps
By: wheaps
Dec 11, 2012
11:26 am
Reads:
2,908
Score:
Unrated

If you’re in IT, there’s a good chance that you’re expending a lot of time and money on the latest, high-end firewalls to keep information in and intruders out. An ironic reality to that fact is that at the same time your business is transitioning their applications out to the cloud. Adding to this firewall…

+ read more

Kent Purdy
Nov 16, 2012
5:54 pm
Reads:
2,509
Score:
Unrated

It many organisations system administrators are called upon to connect our credential rich, web enabled world. Either by default because Apache instances run on servers managed by system administrators, or because Apache administrators lack depth in Light Directory Access Protocol (LDAP) and directory service knowledge. This breed of system administrator is what I refer to…

+ read more

Lawrence Kearney
Oct 22, 2012
5:17 pm
Reads:
6,484
Score:
Unrated

What do Aurora and Shady Rat have in common? They are both so called operations that describe system breaches in high profile companies and government agencies. These and countless other events pointedly demonstrate that few systems are unassailable and that effective system administrators must be able to detect a break-in and mitigate the threat to…

+ read more

gkhays
By: gkhays
Oct 18, 2011
2:00 pm
Reads:
2,745
Score:
Unrated

Here’s a very nice review of NetIQ’s Security Solutions for iSeries in System i Network Magazine. Zac Wiggy does a great job of covering the main areas of concern around security that we consistently hear from customers – especially things like managing privileged user access to these highly critical servers. “One of the most basic…

+ read more

GeoffWebb
By: GeoffWebb
Jul 2, 2009
4:44 pm
Reads:
3,568
Score:
Unrated

I like Wired Magazine’s approach to monitoring the end of the world (as the four horseman of the apocalypse arrive to personally install Conficker on every PC.) So, it’s pretty easy to sit back and kibitz on the general over-hyping of the Conficker threat, especially after the fact (assuming that April 1 really was that…

+ read more

GeoffWebb
By: GeoffWebb
Apr 1, 2009
2:28 pm
Reads:
2,887
Score:
Unrated

It’s interesting that, in all the discussions I see about PCI DSS compliance and security monitoring, I rarely ever see discussions around securing the iSeries platforms. I think part of the time it’s a visibility issue.  The nature of iSeries systems is such that they have often been in place a long time, and the teams…

+ read more

GeoffWebb
By: GeoffWebb
Feb 16, 2009
1:45 pm
Reads:
3,927
Score:
Unrated

End-user XP/NT/NDS password change and synchronization program for NetWare environments.

Jul 3, 2008
12:57 pm
Reads:
2,602
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow