IBM i Data Security. Are you playing your cards right?

hands shuffling cards in the air illustrating the scrambling of data for testing

IBM i Data Security – are you playing your cards right? Test Data solved in four steps 1. Extract, #2. Scramble, 3. Verify, 4. Roll-back Perhaps following on from my previous blog, you’ve got an extract of your live data, an intelligent subset that drives the key test conditions.¬† OK, but the trouble with live […]

IBM i data security. Are you sitting comfortably?

IBM i Data Security – are you sitting comfortably? Test Data solved in four steps #1. Extract,¬†2. Scramble, 3. Verify, 4. Roll-back The IBM i has arguably the best security record of any business application platform in common use. A great place to be if you have one. But pressures on data security have increased […]