Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Watch IBM i security expert Robin Tatam give an analysis of an AS/400 data breach in which threat actors successfully exploited a misconfigured system.
Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i. Get the details on the new security features.
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.
CDW, a leading provider of technology solutions for business, government, and healthcare, was challenged with meeting strict compliance requirements with minimal staff. The company turned to Powertech Security Auditor to reduce manual processes
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...