iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

6 Steps to Execute an IBM i Security Project
Posted on November 26, 2018

Regulations (FISMA, HIPPA, SOX, and more) are forcing companies to evaluate how they protect their sensitive data. Industries such as finance, insurance, and healthcare have the most pressure to comply with these regulations which are geared towards protecting consumer’s private information.  The issue is that companies may not understand how to properly secure their data to protect their consumers. Any good security plan takes a layered approach to protect data.  You have to consider where the data resides and how someone could gain access to it.  Then you have to

In Archive