Resources

Guide

Free eBook: Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook , you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
Datasheet

Powertech Password Self Help for IBM i

Powertech Password Self Help for IBM i enables users to reset their own IBM i passwords immediately, improving user productivity and reducing the demand placed on IT. Schedule a demo today.
Guide

The Ultimate Guide to Investing in Secure File Transfer Software

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover: The...
Guide

6 Users to Put on Your Security Watch List

Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about. Sometimes, security threats come from the inside. In this ebook , you'll learn about eight user types we think you should put on...
Blog

The Ultimate Guide to Investing in Secure File Transfer Software

Are you struggling to secure your file transfers? Need to invest in secure file transfer software but aren’t sure where to look? We’ve got you covered. Walk through the buying process, from start to finish, with this free Ultimate Secure Managed File Transfer Buyer’s Guide.
On-Demand Webinar

Controlling Insider Threats on IBM i

Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Blog

NIST’s Surprising New Password Recommendation

For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that distract from other critical projects? We...
Blog

SFTP vs. FTPS: The Key Differences

Which option for securing sensitive files in transit is the best for your organization? Read this article for an in-depth look at FTP vs. SFTP vs. FTPS, and their key differences.