Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Syncsort Launches Assure Security to Address Increasing Sophistication of Cyber Attacks and Expanding Data Privacy Regulations

Combines Best-In-Class IBM I Security Capabilities to Help Organizations with Major Security and Compliance Challenges

Syncsort, the global leader in Big Iron to Big Data software, announced Assure Security, combining access control, data privacy, compliance monitoring and risk assessment into a single product. Together, these capabilities help security officers, IBM i administrators and Db2 administrators address critical security challenges and comply with new regulations meant to safeguard and protect the privacy of data.

“The New Assure Security: Complete IBM i Compliance and Security.”

There were 828 reported security incidents in 2018 resulting in the exposure of over 1.37 billion records of sensitive data, according to Privacy Rights Clearinghouse, a non-profit corporation with a mission to advocate for data privacy. As regulations to help protect consumer and business data become stricter and more numerous, organizations must build more robust data governance and security programs. They have scrambled to comply with GDPR and the New York Department of Financial Services Cybersecurity regulations and are now preparing for the GDPR-like California Consumer Privacy Act, which takes effect January 1, 2020.

Read More: AiThority Interview Series with Stuart Brock, Director at Seal Software

Related Posts
1 of 40,179

“In a recent survey, Syncsort found security is the number one priority for IT pros with IBM i systems. Given the increasing sophistication of cyber attacks, it’s not surprising 41 percent of respondents reported that their company experienced a security breach and 20 percent more were unsure if they had been breached,” said David Hodgson, CPO, Syncsort. “Our new Assure Security product leverages our wealth of IBM i security technology and expertise to help organizations address their highest-priority challenges. This includes protecting against vulnerabilities introduced by new, open-source methods of connecting to IBM i systems, adopting new cloud services and complying with expanded government regulations.”

Read More: Growth Opportunities and Challenges for Optimizing the Electric Grid Through Data Analytics

Assure Security brings together best-in-class IBM i security capabilities acquired by Syncsort into an all-in-one solution, with the flexibility for customers to license individual modules. Highlights of the new product include:

  • Assure Compliance Monitoring quickly identifies security and compliance issues with real-time alerts and reports on IBM i system activity and database changes. Innovative new technology also monitors views of highly confidential Db2 data, with the option to block data from view. Security data can optionally be sent to enterprise SIEM solutions, where IBM i security can be monitored alongside other enterprise platforms.
  • Assure Access Control provides control of access to IBM i systems and their data through a bundle of capabilities that deliver powerful, flexible multi-factor authentication with RSA SecurID certification, automated management and tracking of elevated user authorities, and comprehensive coverage of system and database access points.
  • Assure Data Privacy protects IBM i data at-rest and in-motion from unauthorized access and theft through a combination of NIST-certified encryption, tokenization, masking and secure file transfer capabilities. Encryption and tokenization are conveniently packaged together for protection of data at rest, while secure file transfer protects data moving across networks from view.
  • Assure Security Risk Assessment thoroughly examines over a dozen categories of security values, open ports, powerful users and more to report on findings and deliver recommendations for addressing vulnerabilities. A summary report is provided for less technical stakeholders, and risk assessment services are available through Syncsort Global Services to perform the assessment and advise on remediation steps.
  • Integration with Syncsort’s MIMIX and Quick-EDD High Availability products through a common enterprise monitoring dashboard and failover scripting to simplify monitoring and switching for users of both Assure Security and Syncsort’s High Availability products.

Read More: NVIDIA Backs Round-The-Clock Checkout-Free Grocery Shopping Start-Up AiFi

4 Comments
  1. Scrap Copper export says

    Integrated copper recycling Scrap copper logistics Metal scrap sustainability
    Copper cable scrap regulations, Metal recovery yard services, Copper scrap melting processes

  2. sklep internetowy says

    Wow, awesome blog format! How long have you been blogging for?
    you make blogging look easy. The total look of
    your web site is wonderful, as neatly as the content material!
    You can see similar here sklep internetowy

  3. e-commerce says

    I needed to thank you for this good read!! I certainly enjoyed every bit of it.
    I’ve got you book-marked to look at new stuff you post… I
    saw similar here: Sklep

  4. Backlink Portfolio says

    Good day! Do you know if they make any plugins to assist with Search Engine Optimization? I’m
    trying to get my blog to rank for some targeted keywords but
    I’m not seeing very good gains. If you know of any please share.
    Thanks! I saw similar text here: Auto Approve List

Leave A Reply

Your email address will not be published.