Kisco Systems

Kisco U

Free training to secure every IBM i

We sell software, but we give away knowledge for free!
Sign up to receive an email update when we add new content to Kisco U

LATEST CONTENT

  • i2Pass webinar: IBM i MFA with DUO authentication [video]

    In this product update webinar for version 4 of i2Pass, we talk about MFA for IBM i, the advantages of MFA authentication with DUO, and how we have integrated mobile authenticator apps into our MFA products.

    Read more

  • Red Alert - High Risk Profiles

    Certain combinations of user profile configurations create a very insecure, high-risk condition that should be rectified immediately. Here's how to find out if you are exposed.

    Read more

  • IBM i Security Fundamentals: Disaster Recovery [video]

    Justin Loeber, from Kisco Systems, and Ed Moon, CTO of Absolute Performance, discuss disaster recovery for the IBM i. Topics include business case, technical definitions, strategies and tips for selecting a vendor.

    Read more

  • QSYSOPR mass export

    If you want to capture and report on all QSYSOPR activity, it is possible export the message queue natively in the IBM i OS.

    Read more

  • Audit IFS shares with iSecMap

    iSecMap Release 2.02 (PTF level ISPTF202) includes a feature that will track Netserver Path Shares in the IFS when shares are created, removed or have permissions changes.

    Read more

  • IBM i OS 7.5 TR3 Security Enhancements

    It's critical to pay attention when IBM releases major updates for the IBM i operating system. TR3 includes several new security features and enhancements.

    Read more

  • Defending against Social Engineering attacks

    Social Engineering is a low-tech cybersecurity attack in which a hacker impersonates someone in the organization, usually by calling help desk to request a password change. Once this is done, the hacker has access to the system.

    Read more

  • IFS Overview

    If you grew up with the IBM i OS from the early days, you know that the native file system that is based on libraries and objects within those libraries. Security can be implemented at the library level and at the object level and the hierarchy is intuitive. The IFS can be different.

    Read more

  • System audit values for iEventMonitor features

    The system audit value QAUDLVL (or QAUDLVL2) will be need to set for the various audit functions to work. Here is a list of the Audit Codes in iEventMonitor along with their corresponding system audit values.

    Read more