Resources

Case Study

Halcyon Helps Computacenter Deliver Efficient Managed Services

Computacenter is Europe’s leading independent provider of IT infrastructure services. They offer consulting services as well as implementation and operation services for networks and data center infrastructures on or off client premises and in the cloud. ...
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to...
Blog

Service Level Management

While IT managers agree that service level management (SLM) is critical to their organizations, many also find it intimidating. It need not be. An SLM program is what you make it - it can be formal or informal, all-encompassing or focused on key services. The point is to document required service levels for services provided to the business by the IT organization. Service...
Blog

Top 15 Vendors in Capacity Management Software

Where TeamQuest (now part of Fortra) Capacity Management Stands TeamQuest, a global leader in capacity management and predictive analytic modeling, has made the Top 5 Vendors list by Research in Action’s 2016 Capacity Management SaaS and Software Report. Called “the most important focused player in capacity management,” TeamQuest (now part of Fortra) scored higher in customer...
Blog

What Is Queuing Theory?

Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Article

Global IT Management Survey 2016—NewsWorthy Analysis

Results of a Kelton survey in which IT departments in large enterprises are tasked with responding to numerous business-impacting issues on any given day, including equipment failures, fluctuating website demand, and data security.
Case Study

Telecom Company Meets Strict Service Requirements & Prevents Major Service Failure

Organization Description: Voice and data services provider focusing on serving customers in rural areas and small to mid-sized cities. The company has greater than three million customers in 22 states and annual revenues of $2.4 billion. Business Value of Vityl Capacity Management (formerly TeamQuest): Client uses Vityl to identify bottlenecks in applications and to eliminate...