Resources

Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog

What to Know about the New NIST Cybersecurity Framework

Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Article

What Can Intermapper Monitor?

What can Intermapper monitor? Just about anything. Learn how to monitor any device with an IP address, making your network visibility as comprehensive as possible.
Guide

Enterprise Monitoring Success

Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.
Blog

How DR Compliance Requirements Impact HA Decisions

Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Case Study

Field-level Encryption Helps Retail Chain Achieve PCI Compliance

Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors. “We need to be able to access credit card...
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog

Network Monitoring for the Back-to-School Season

With the start of the school year upon us, IT administrators everywhere are preparing their networks for surges in traffic as students and teachers return. But what do they need to ensure a smooth transition from the slow summer months to the busy school year?
Article

What Makes the Good Morning Report So Good?

There is nothing like waking up to find the latest news delivered right to your doorstep, waiting for you on the printer, or sent to you electronically. For years, our customers have started their days reading the Good Morning report from Robot Schedule.