IBM i Data Security. Are you playing your cards right?

hands shuffling cards in the air illustrating the scrambling of data for testing

IBM i Data Security – are you playing your cards right? Test Data solved in four steps 1. Extract, #2. Scramble, 3. Verify, 4. Roll-back Perhaps following on from my previous blog, you’ve got an extract of your live data, an intelligent subset that drives the key test conditions.  OK, but the trouble with live […]

IBM i data security. Are you sitting comfortably?

IBM i Data Security – are you sitting comfortably? Test Data solved in four steps #1. Extract, 2. Scramble, 3. Verify, 4. Roll-back The IBM i has arguably the best security record of any business application platform in common use. A great place to be if you have one. But pressures on data security have increased […]