Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
On-Demand Webinar
How to Access Meaningful Information with Data Visualization
It's not news that everyone needs accurate business data these days—and they needed it 5 minutes ago. Real-time, actionable information needs to be simple to access and shouldn't require IT to translate it into something a business user will understand.
In this webinar you'll see:
How Sequel makes your KPIs accessible in powerful dashboards
How many ways users can analyze their data in client...
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
On-Demand Webinar
Your Power Half Hour—From Query to BI with Sequel
Your IT team is asked to provide IBM i data to people from all over the organization. Upper management wants big picture stats to see how your organization is doing with key performance indicators. Operational users need detailed information—sometimes even down to the minute—to improve operations. Sales needs customer information to provide better service and metrics to make data-driven decisions....
Datasheet
Security Scan for IBM i
Security Scan for IBM i is a free service centered on Fortra’ expertise with the IBM i platform and its unique security concerns.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
On-Demand Webinar
How to Modernize Your IBM i Queries with Sequel
You don't have to move your data off of IBM i to modernize your queries and give users real-time information in a modern environment. Sequel can help.
Datasheet
Powertech SIEM Agent for IBM i
Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Blog
Access Data While Maintaining IBM i Security
Tue, 10/16/2018
Why do you need extra data access security on IBM i? Find out. Plus, learn how to secure data access, let users analyze data, and distribute data securely.
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Blog
How SIEM Protects Cloud Servers
Tue, 10/16/2018
Security information and event management (SIEM) applications help IT professionals oversee their vast technology infrastructures, including cloud repositories. SIEM applications aggregate data from many different types of systems to present a clear view of the actionable security tasks your team must address to protect your business.
Guide
Data Access in a Big Data World: How to Access Big Data so You Can Use It
With organizations collecting more customer, transactional, and relational data than ever before, data volumes are beginning to expand past their system’s processing capacity. But big data doesn’t have to be alarming. Go beyond the hype and conquer your IBM i data.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in the number of SIEM...
Blog
SAO vs. SIEM: Not Enemies, But a Security Defending Duo
Thu, 08/16/2018
As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
On-Demand Webinar
Creating Simple Yet Powerful Queries with Sequel
Query-building should be functional and flexible to fit your organization's needs. Sequel helps you build powerful and simple queries for better data access.
Datasheet
Sequel Data Warehouse
Complete integrated suite of tools to build and manage data warehouses and data mart environments.