Title: Security Tip
  October 12, 2004 Published by  Search400.com   

Security Tip

search400.com
News Topics ITKnowledge Exchange Tips Ask the Experts Webcasts White Papers
Issue Sponsored By:
  > Bytware


IN THIS ISSUE:
  >  Your built-in security consultant -- Free of charge
  >  Standardized security setup across multiple systems
  >  Securing users within OpsNav
  >  Learning Guide: Simple steps to a secure iSeries
  >  Top advice on securing your iSeries
  >  Tip contest: Win a Skagen slimline watch
  >  User poll: Vote now

Headlines


Your built-in security consultant -- Free of charge
[Search400.com]
Rich Loeber

If you're looking around for a security consultant who won't cost you too much, you might just already have one at your disposal hidden away in Operations Navigator (or iSeries Navigator, depending on your version of OS). It comes in the form of a Security Wizard, and the amount of analysis and information provided is pretty good, especially at the price.

MORE INFO:
View previous tips by Rich Loeber


 
AD Bytware
Deleted Files. It's happened to us all, either deleted by accident, by a virus, or by a disgruntled employee. Wouldn't it be nice if these files could be restored as easily as they were deleted, without having to turn to time-consuming and costly backups? Now they can. With StandGuard Recycle Bin, the new Windows-style file protection utility designed specifically for the iSeries, you can bring back lost files from all of your mapped drives with just a few clicks of your mouse. For details and a free trial, visit us at COMMON booth 305 and online.
 

Standardized security setup across multiple systems
[Search400.com]
Nothing supports the popularity of the iSeries as much as the number of customers with multiple systems installed. For security officers, it can easily mean a lot of extra work keeping each system configured and setup for company security policies. While this can be a complex task, IBM has provided a little-known capability in OS/400 for quite a while now that can help you to enforce standard security configuration setup rules across separate systems.

Securing users within OpsNav
[Search400.com]
One Search400.com member asks, "How do I secure users with what access they have within Operations Navigator?" Security expert Carol Woodbury talks about the options and how it may be best to use a combination of three of these options.

Learning Guide: Simple steps to a secure iSeries
[Search400.com]
If you're a systems manager, chances are security is your top priority. With new security issues emerging on a daily basis, it can seem like you're swimming against the tide when trying to secure your system from both intentional and unintentional security breaches and threats. We've gathered some good security information in this security Learning Guide to help you along your way. Consider it a security life preserver of sorts.

Top advice on securing your iSeries
[Search400.com]
Security expert Carol Woodbury answers questions on granting special authority, changing user authority, Sarbanes-Oxley regulations and more in these top expert Q&As.

Also on Search400.com

SEARCH400.COM PRODUCT OF THE YEAR AWARDS:  Accepting nominations now
Have a great product or tool? In January, Search400.com will present its Second Annual Product of the Year awards. The awards will highlight and celebrate those entries in the market that are deemed outstanding examples of new and innovative technological advancement for users.

Submit an application to have your product considered. But act fast: The deadline to submit nominations is Monday, Oct. 25.

SUBMIT A TIP TODAY:  Tip contest: Win a Skagen slimline watch
This month winner will receive a Skagen Slimline watch. This watch has a sophisticated large black face with chrome arrow markers. It's a chrome-plated, 100% stainless steel case with luxurious black calfskin leather band. It also features scratch-resistant mineral crystal and Japanese quartz movement. So don't waste time, send in your tip today!

Don't forget to go in and rate our recent tips:

Easy code copying ... without CODE400
Generic trigger program to capture create/change date and time
Using files with multiple members in SQL or ODBC
Quick view contents of a data file
Find duplicate records in a file


USER SURVEY:  User poll: Vote now
How loyal are you to your employer?


 
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
 
 
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

 Search400: Today's News
 Search400: Administrator Tips
 Search400: Programmer Tips




Not a Member? We?ll activate your membership with your subscription.
 




TechTarget - The Most Targeted IT Media This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.

To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=494166&lid=460581&track=NL-236&ad=494166

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
Search400
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to