On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Blog
Could Ransomware Like WannaCry Hit IBM i?
Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study
Powertech Protects City Data and Vital Services with System i Security
The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Automated Solutions Help Bank of Stockton Improve Security and Compliance
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...
Case Study
Powertech Helps the Seneca Nation Play the Security Game
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...