Blog
How to Generate Revenue in AP
Tue, 08/28/2018
Accounts Payable not only doesn't have to be a cost center these days. But automating AP can actually make it a profit center.
Blog
The Top Benefits of Accounts Payable Automation
By Richard Schoen on Wed, 08/15/2018
There's no place for paper in today's AP processes. Find out how to save time and money with AP automation.
Case Study
Fortra Protects the COMP Performance Group from Viruses and Malware
The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software.
After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Blog
When Would You Notice an IBM i Security Breach?
By Robin Tatam on Fri, 08/03/2018
Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Datasheet
Powertech Multi-Factor Authentication Compliance Datasheet
Comply with Security Standards, Including PCI DSS
The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Getting Started with IBM i Security: Object Authority
Wed, 07/11/2018
Get a better understanding of how IBM i default authority values work and how you can minimize security gaps around them.
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
On-Demand Webinar
Getting Started with IBM i Security: Integrated File System (IFS)
By Sandi Moore
Watch this video from IBM i security expert Sandi Moore to learn what makes an IFS security strategy successful and the steps you can take to begin securing your IFS.
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
Datasheet
Webdocs for AP
Webdocs streamlines invoice processing by capturing invoices electronically and routing them through every step of your accounts payable (AP) workflow.
On-Demand Webinar
Getting Started with IBM i Security: System Values
Wed, 05/09/2018
Security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. View this on-demand webinar to get guidance on their best practice settings.
On-Demand Webinar
Survey Results: Cybersecurity Risk Mitigation Strategies
By Robin Tatam
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.