Resources

Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Guide

IPv6 Transition Survey Results

Are IT pros already making the transition to IPv6? Should you? Now that the IPv4 address space has been depleted, every business will eventually be forced to make the switch to IPv6. In early 2017, we asked over 100 IT pros to share how their IPv6 transition is coming along. Here’s what we learned: Only 10% of organizations surveyed have...
Guide

What IT Leaders Need to Know About Education Technology

How IT Professionals Can Champion EdTech to Impact Student Success Technology in education is rising, and the possibilities to enhance student learning with digital tools are endless. How can IT professionals get the budget and buy-in you need to implement new EdTech initiatives, all while maintaining a healthy network that can grow and scale...
Guide

Which Network Monitoring Tool is Right for You?

Use this interactive checklist to conduct a network monitoring tools comparison with Intermapper and other solutions. Comparing network monitoring tools can be tricky. Network managers at organizations of all sizes trust Intermapper to provide the real-time knowledge they need to maintain a healthy network. What’s more, Intermapper is a vendor-agnostic solution that works across multiple...
Case Study

How CalSTRS Benefits from Real-Time Mapping and Monitoring

"InterMapper's probes poll all our devices twice a minute. They return a lot of information: if the device is alive, if it's responding to SNMP, and if all the interfaces are up." - Shawn Hickox, Lead Network Engineer of Enterprise Iniatives and Technology
Case Study

Powertech Helps Community Bank Enforce Internal iSeries Compliance

First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study

Powertech Protects City Data and Vital Services with System i Security

The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study

Powertech Helps the Seneca Nation Play the Security Game

The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...