Resources

Case Study

Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400

Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Blog

Cracking the Problem of Endpoint Security

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Case Study

Fortra Helps International Rectifier Tackle Critical SOX Issues

Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion. Compliance Regulations Remain at the Top of Exec's Minds Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
Case Study

Powertech Helps Community Bank Enforce Internal iSeries Compliance

First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study

Powertech Protects City Data and Vital Services with System i Security

The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study

Powertech Helps the Seneca Nation Play the Security Game

The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...