Syncsort has acquired Cilasoft

Read more
Home : Download | Videos

Videos

Cilasoft and IBM Security QRadar SIEM - Scenario 3

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftDisplay

Cilasoft and IBM Security QRadar SIEM - Scenario 2

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftDisplay

Cilasoft and IBM Security QRadar SIEM - Scenario 1

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & CilasoftDisplay

Cilasoft and IBM Security QRadar SIEM - Introduction

 Protect your crown jewels by staying ahead of cyber threats with IBM Security & Cilasoft  Display 

QJRN/400 - IBM i Journals and more

Making IBM i Journals your friend

Turn your Audit and Data journals into real time alerts and scheduled reports     

Presented by Guy Marmorat and Steve Bradshaw
Display

CONTROLER - Data Centric Protection

Intelligent Data Protection
Irrespective of how it is accessed

The ultimate in data protection tools brings Data Centric protection to your system

Presented by Guy Marmorat and Steve Bradshaw
Display

EAM - Elevated Authority Manager

Automatically give your users the authority they need
But only when they need them!

Presented by Guy Marmorat and Steve Bradshaw           
Display

5 Essential Ways to Secure your Business Critical Data on IBM i

Speaker: IBMi security veteran George Huibregtse

Your business critical files are always changing, but how do you know which changes to your business critical files are good or bad?

In this session, IBMi security veteran George Huibregtse shows you how to:  
1. Identify changes on specific fields on business critical files. 
2. Identify global changes made from outside the application. 
3. Be alerted when a value has been changed that exceeds a predefined threshold. 
4. Report on command activity for powerful profiles. 
5. Manage the audit trail access.

George Huibregtse shows you how to use Cilasoft's QJRN/400 product to easily generate accurate, relevant, & readable reports on any kind of system 
or database activity.
WMV | 69 MB | Download

IBMi Invisible Data Access Methods - Detecting and Preventing Undetectable Data Theft

Educational Security and Compliance Webcast
Featured Speaker: Security and Compliance Expert Dan Riehl.

The webcast was recorded in GoToMeeting format. 
You must have GoToMeeting installed, or download the GoToMeeting codec to view a video recorded in the GoToMeeting format.  The GoToMeeting codec allows you to watch these videos using Windows Media Player 9 or higher without subscribing to GoToMeeting.  Visit http://www.gotomeeting.com/codec to download the codec.
GoToMeeting is a trademark of Citrix Online, LLC.
ZIP | 198 MB | Download