i2Pass v3.0 - general release on April 28, 2022
Instant 2FA for the IBMi! i2Pass adds two-factor authentication (2FA) to the IBMi. With 2FA being a critical component of many Enterprise IT security frameworks and cyberinsurance policies, IBMi shops cannot ignore this extra layer of protection.READ MORE >>
iEventMonitor v6.0 - general release on March 14, 2022
iEventMonitor watches IBM i message queues in real time to issue alerts according to parameters that you control. What's more, you can receive alerts, read job logs and respond to messages remotely using an integrated web service.READ MORE >>
We take a first look under the covers at upcoming security changes in v7.5, including several welcome and long overdue updates. And some potentially disruptive ones, for shops that haven't been staying current.
Anything that you can do to discourage unwanted access to your IBM i system is a good idea. So, when I heard about Port Restrictions, I immediately thought that it would be a great idea to just shut down all the unused ports on our test box.
Have you ever wondered who is connected to your system with a network connection? In these days of interconnected systems, this should be a concern for all IBM i security officers. Even if you have fully deployed firewalls and exit point security, the answer to the above question might contain some surprises.
KISCO SOFTWARE IS PROTECTING THESE COMPANIES AND MORE