Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
On-Demand Webinar
How to Control Your Data and Stay Compliant with Robotic Process Automation
By Pat Cameron
Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation ( RPA ) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today. Your Greatest Threat May Come from Within In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
On-Demand Webinar
Meeting GDPR Compliance with Robotic Process Automation
The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018 . Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
HR Automation Tips Part 2: How to Get Started with HR Automation
By Richard Schoen on Thu, 06/22/2017
Choose your path to automating HR—and focus on what matters most.
Blog
HR Automation Tips Part 1: Signs You Should be Automating
By Richard Schoen on Tue, 05/23/2017
Find out if it’s time to automate HR processes at your organization.
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Automate Data Capture with Sequel
Many businesses use Sequel to generate electronic reports, dashboards, and other business output they can use to analyze critical business information in real time. Often these data sources contain metrics that are updated on-the-fly, such as shop floor order status information or customer order and shipment data. How nice would it be if you could not only capture real-time data from your Sequel...
Press Release
HelpSystems (now Fortra) Acquires Tango/04 Computing Group to Meet Growing Global Demand
Fortra and Tango/04 combine to help organizations in Europe and Latin America with systems management, monitoring, and security solutions.
Press Release
HelpSystems (now Fortra) Acquires Multi-Platform Systems Management Provider Halcyon Software
The recently acquired Halcyon Software solutions reduce the complexity and cost of monitoring, automating, and reporting on core applications and processes on IBM i, AIX, Linux, and Windows servers.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...
Press Release
HelpSystems (now Fortra) Expands its Business Process Automation Offerings with Acquisition of Network Automation, Inc.
With this acquisition, Fortra offers one of the industry's most comprehensive IT and business process automation portfolios with virtual and cloud-based technology, as well as a broad set of application integrations.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...