Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
Blog
Banking on Value: Why Banks Are Turning to Data Warehouses for Insight
By Alan Jordan on Tue, 05/09/2017
Find out why so many banks are turning to data warehouses for trustworthy analytics and actionable insight.
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Compare Powertech Encryption for IBM i to IBM's Cryptographic APIs for Encrypting Database Fields
By Bob Luebbe on Fri, 03/17/2017
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Case Study
Hershey Entertainment Quickly Encrypts Credit Card Data with Powertech Encryption for IBM i
Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...
Case Study
Field-level Encryption Helps Retail Chain Achieve PCI Compliance
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
Blog
SFTP vs. FTPS: The Key Differences
Thu, 12/01/2016
Which option for securing sensitive files in transit is the best for your organization? Read this article for an in-depth look at FTP vs. SFTP vs. FTPS, and their key differences.
Pagination
- First page
- Previous page
- 1
- 2
- 3
- 4
- 5
- 6
- 7