Guide
The Business Leader’s Handbook for Building an Automation Center of Excellence
Creating an automation center of excellence (COE) ensures that you are automating your enterprise with strategy and vision. This guide gives you the expertise you need to put together a great team, follow best practices, and continually optimize your automation COE.
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Building a Better Virus Trap
By Sandi Moore on Fri, 03/10/2017
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog
A Virus on i?
By Sandi Moore on Thu, 03/09/2017
Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog
Three IFS Security Weaknesses You Must Secure Now
By Robin Tatam on Thu, 03/09/2017
The Integrated File System (IFS) is one of the most ignored parts of the system, yet it makes possible many of the most powerful and most used features on IBM i servers today.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...
On-Demand Webinar
The Truth About Viruses on Power Systems
By Robin Tatam
Are viruses just a Windows threat? Not in today's connected environments. Attend this webinar to learn how to protect your Power Systems server.
Blog
SFTP vs. FTPS: The Key Differences
Thu, 12/01/2016
Which option for securing sensitive files in transit is the best for your organization? Read this article for an in-depth look at FTP vs. SFTP vs. FTPS, and their key differences.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
Fortra Integrates McAfee Embedded Control Antivirus Protection for Power Systems Servers
As Bytware and IBM realized the serious exposure to Power Systems users, they turned to McAfee to integrate the McAfee Embedded Control scanning engine into the Powertech Antivirus product.
Case Study
Clover Stornetta Farms relies on StandGuard for the Heavy Lifting
When Clover Stornetta Farms expanded operations to multiple locations, the Northern California dairy processor turned to Stand Guard Network Security to improve security.
Case Study
Winning Security Combo Locks Down and Protects Trailer Transit, Inc's IBM i
Trailer Transit—a leading transportation company—uses Powertech Antivirus to eliminate viruses and StandGuard Network Security to prevent unauthorized access.
Case Study
IBM i Virus Protection Adds an Essential Service to City of Columbia
When it comes to city services, data protection is a must. To track down the source of viruses on their multi-platform network, the City of Columbia turned to Stand Guard Anti-Virus.
Article
Sample Workflow: Email Integration and Automation in Customer Relationship Management
Fri, 02/10/2012
Here's how an Automate user streamlined customer interaction with email automation using an Automate task for Microsoft Dynamics CRM and Exchange.
Pagination
- First page
- Previous page
- 1
- 2
- 3
- 4
- 5
- 6
- 7