Vous êtes ici : Téléchargements | Videos

Videos

Cilasoft and IBM Security QRadar SIEM - Scenario 3

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftVisionner 

Cilasoft and IBM Security QRadar SIEM - Scenario 2

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftVisionner 

Cilasoft and IBM Security QRadar SIEM - Scenario 1

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftVisionner 

Cilasoft and IBM Security QRadar SIEM - Introduction

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & Cilasoft  Visionner

QJRN/400 - IBM i Journals and more

Making IBM i Journals your friend

Turn your Audit and Data journals into real time alerts and scheduled reports    

Webinar presenté par Guy Marmorat et Steve Bradshaw 
Visionner

CONTROLER - Data Centric Protection

Intelligent Data Protection
Irrespective of how it is accessed

The ultimate in data protection tools brings Data Centric protection to your system

Webinar présenté par Guy Marmorat et Steve Bradshaw    
Visionner

EAM - Elevated Authority Manager

Automatically give your users the authority they need
But only when they need them!

Webinar presenté par Guy Marmorat et Steve Bradshaw           
Visionner

5 Essential Ways to Secure your Business Critical Data on IBM i

Webinar animé par George Huibregtse (en anglais), consultant expérimenté en sécurité sur IBM i

Your business critical files are always changing, but how do you know which changes to your business critical files are good or bad?

In this session, IBMi security veteran George Huibregtse shows you how to:  
1. Identify changes on specific fields on business critical files. 
2. Identify global changes made from outside the application. 
3. Be alerted when a value has been changed that exceeds a predefined threshold. 
4. Report on command activity for powerful profiles. 
5. Manage the audit trail access.

George Huibregtse shows you how to use Cilasoft's QJRN/400 product to easily generate accurate, relevant, & readable reports on any kind of system 
or database activity.
WMV | 69 Mo | Télécharger

IBM i Invisible Data Access Methods - Detecting and Preventing Undetectable Data Theft

Educational Security and Compliance Webcast animé par Dan Riehl (en anglais), expert en sécurité sur IBM i

Le webcast a été enregistré au format GoToMeeting. 
Vous devez soit installer GoToMeeting soit télécharger le codec GoToMeeting sur www.gotomeeting.com/codec pour visualiser cet enregistrement. Ce codec permet de lire la vidéo au moyen de Windows Media Player 9 ou version ultérieure sans installer le logiciel GoToMeeting. 
GoToMeeting est une marque commerciale de Citrix Online, LLC.
ZIP | 198 Mo | Télécharger