Call Us Today! Asia Pac: +61 (0)2 9188 9455 | USA: +1 (303) 800-5574 |info@kantionit.com

Security management software

The Essential Guide to Secure and Managed File Transfers on the IBM i

2022-11-01T12:33:56+11:00

Learn more about how the functionality and affordability of today’s managed file transfer (MFT) solutions bring many benefits to companies of all size including helping businesses save significant staff time, reducing security exposures, meeting SLAs and even creating new competitive advantages. For many organizations, the IBM i plays a central role in the business-critical [...]

The Essential Guide to Secure and Managed File Transfers on the IBM i2022-11-01T12:33:56+11:00

Generating Safe Test Data in PDF and Image Files

2022-10-11T14:32:27+11:00

Do you know how to create realistic artificial test data in unstructured documents or file formats you already use? Creating safe, anonymized test data is an important measure in preventing a data breach. By supplying your own, or IRI-synthesized, set data to the IRI DarkShield API, you can build the test files you need in [...]

Generating Safe Test Data in PDF and Image Files2022-10-11T14:32:27+11:00

Cybersecurity Insurers demanding better controls

2022-10-10T11:55:57+11:00

This insurance document crossed our desks recently - and we think all IT security professionals and managers should be aware of its message within: Among the minimum measures that Cybersecurity Insurance providers expect Australian organisations to have taken now includes encryption-at-rest of Personal Identifiable Information (source: ACP). The alternative is to pay much higher premiums [...]

Cybersecurity Insurers demanding better controls2022-10-10T11:55:57+11:00

Ransomware’s data theft goal.

2021-04-30T11:20:29+10:00

Data theft prior to scrambling files is part of the Ransomware game plan. For us, this Sophos article reinforces the need to encrypt Intellectual Property, contracts, and other commercially sensitive data, not just PII (or PAN) data dictated by regulations. Kantion's IRI Data Protector suite of products automates the sensitive data discovery and masking/encryption process [...]

Ransomware’s data theft goal.2021-04-30T11:20:29+10:00

Listen to the security guru Carol Woodbury…

2021-03-29T13:21:49+11:00

Here's your opportunity to listen to one of the world's most prominent IT security experts.In this exclusive webinar Carol Woodbury, author of several published books on IBM i security, presented live to our ANZ community and held a Q&A session.In this Defence in Depth presentation, Carol discussed implementing multiple IBM i technologies that help prevent [...]

Listen to the security guru Carol Woodbury…2021-03-29T13:21:49+11:00

Kantion provides Toyota with JSOX security software solution

2022-10-11T12:24:39+11:00

February 2017: Kantion is delighted to welcome Toyota Material Handling Australia (TMHA) onboard as a new customer! The purchase and implementation of the Assure Security security software solution will help TMHA comply with the Japanese Financial Instruments and Exchange Law (otherwise known as JSOX).  This requires, for example, that TMHA can demonstrate control of [...]

Kantion provides Toyota with JSOX security software solution2022-10-11T12:24:39+11:00
Go to Top