Resources

Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Blog

Concerns in Creating a Paperless Office

Identified as a key trend of the future and a way to improve business efficiency, the idea of a “paperless” office (or more realistically, a “less paper” office) is spreading relatively slowly. Why is that?
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Blog

3 Ways Digital Document Management Helps Financial Institutions

Secure document management is an important consideration for any business, but for financial instutions in particular, keeping data secure is critical to keeping business running smoothly and clients happy. Learn how digital document management gives financial instutions the competitive edge they need to succeed.
Blog

Document Automation: The Best of Both Worlds

Using automation software with your existing document management solution can further streamline complicated or redundant business processes and maximize productivity across your company.
Blog

Moving Documents Between IFS Folders

Because Webdocs maintains a separation between its internal file structure and the operating system’s, you can organize documents for your users in one manner, while organizing them on the IFS in an entirely different manner. This article takes you through the steps of reorganizing the folder structure on the IFS.
Article

Considerations For Securing NFS Shares For Use With Webdocs iSeries

NFS has long had a tentative relationship to security. As with its cousin, CIFS/SMB (more commonly know as Windows File Sharing), security was not an area of primary focus. The elements of security that exist are significant, but they are nontrivial to implement, particularly across operating systems and with third-party applications.
Blog

Tips and Advice for Going Paperless in the Office

The dream of taking your company into a completely paperless world may feel daunting. But there are little things that can assist you in taking that big step toward your paperless goals, all while saving your business money and helping the environment. So where do you start?
Case Study

Fortra Helps International Rectifier Tackle Critical SOX Issues

Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion. Compliance Regulations Remain at the Top of Exec's Minds Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...