Managed Service Providers (MSPs): Encryption & Key Management for Your Customers
Looking for specific information? Use our search below to find what you're looking for.
Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format. This presents a challenge for administrators who need to monitor their IBM i logs.
Are you monitoring the system logs on your IBM i? Learn how to do it better.
Like other IT projects, the implementation of up-to-date logging requires careful planning. For example: systems need to be monitored and the parameters related to security and archiving need to be defined.
Learn why the speed of your encryption is important, simple tests that you can do to help decide which FIELDPROC encryption solution is right for you, and what to look for when deciding on a solution.
Patrick Botz and Patrick Townsend Discuss encryption, key management, and meeting compliance regulations on the IBM i.
This podcast covers what FIELDPROC is and isn’t, security risks with the FIELDPROC APIs, and what Townsend Security is doing the help people who want to use FIELDPROC for encryption.
For companies who decide to host their applications or store data in the cloud, they need to answer a series of questions. How secure is my data in the cloud? Is my data encrypted? Who has access to my keys?
Advances in encryption technology have made protecting sensitive data easier than ever. However, encryption key management has remained a challenge.
While Amazon Web Services (AWS) delivers a secure, scalable cloud computing platform, organizations may be required to deploy an additional layer of security to protect the data they store in the cloud.
As organizations move their business applications and sensitive data to Microsoft Azure and leave behind the traditional data center, they need to be concerned about data security.