Article
I’ve Got *ALLOBJ Authority And I’m Not Afraid To Use It—Part 2
By Robin Tatam on Thu, 06/27/2019
While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.
Blog
How Do You Go Paperless? Tips to Help You Get Started
By Greg J. Schmidt on Thu, 04/25/2019
Find out. And if you aren’t there yet, get tips for actually going paperless.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Blog
What is Document Capture Automation and What are the Benefits?
By Richard Schoen on Fri, 04/19/2019
Learn about document capture—and why you should be automating it.
On-Demand Webinar
Secure and Automate Your File Transfers for IBM i
By Heath Kath
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
Blog
The Pros and Cons of Scripting
Thu, 03/21/2019
There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
5 Quick Wins for Document Management this Year
By Richard Schoen on Tue, 01/15/2019
Do you need document management in 2019? Discover five quick wins that make it easy to get started.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool!In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
Blog
Cloud Watching: Ensuring Security in Every Cloud Environment
By Bob Erdman on Fri, 11/02/2018
Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Datasheet
Powertech SIEM Agent for IBM i
Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Datasheet
Powertech Authority Broker for IBM i
Satisfy your auditor requirements with reports that provide a complete audit trail of privileged user activity with Powertech Authority Broker for IBM i. Schedule a demo today.
On-Demand Webinar
The Keys to Securing Data in Motion
In this third-party webinar from InfoSecurity Magazine, you'll explore the five keys to securing sensitive data in motion—compliance, collaboration, encryption, secure email, and automation—and how to implement them in your organization.