Resources

Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...
Datasheet

Powertech Compliance Monitor for IBM i

Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Schedule a demo today.
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
On-Demand Webinar

Meeting GDPR Compliance with Robotic Process Automation

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018. Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Case Study

Powertech Helps the Seneca Nation Play the Security Game

The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...