On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
On-Demand Webinar
Reduce the Cost and Effort of IBM i Auditing
By Robin Tatam
IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
On-Demand Webinar
Expert Tips for Avoiding AIX Security Mistakes
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Case Study
Field-level Encryption Helps Retail Chain Achieve PCI Compliance
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Lessons Learned from the AS/400 Breach
By Robin Tatam
Watch IBM i security expert Robin Tatam give an analysis of an AS/400 data breach in which threat actors successfully exploited a misconfigured system.
On-Demand Webinar
IBM i Audit Capabilities
By Robin Tatam
Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar
What’s New in IBM i Security in V7R3 and V7R2
Thu, 12/08/2016
IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i. Get the details on the new security features.
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
Case Study
Policy Minder Helps Amway Remove the Guesswork from PCI Security Compliance
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study
Powertech Protects City Data and Vital Services with System i Security
The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study
Powertech Helps C&D Technologies Achieve AS/400 SOX Compliance
As a publicly traded company with a lean IT department, C&D Technologies has been greatly impacted by Sarbanes-Oxley (SOX) regulations. Despite its size, the IT department needed to comply with these regulations through better user management, monitoring, and reporting...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Automated Solutions Help Bank of Stockton Improve Security and Compliance
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...