Case Study
Humanitarian Organization Reduces Application Slowdowns by 94%
Organization Description: This humanitarian group organizes more than 500,000 volunteer employees to help victims of tragedy across the United States.
Business Value of Vityl Capacity Management (formerly TeamQuest): Vityl helped this non-profit reduce the number of application slowdowns by 94 percent in only four months.
...
Case Study
Financial Services Giant Optimizes, Virtualizes, and Saves Big Money
Business Value of Vityl Capacity Management (formerly TeamQuest): Vityl helped to significantly optimize the physical CPU base, maximize usage of CPU and memory resources, lower the cost per unit of CPU to clients and improve the time to market. The Fortune 500 financial services company now charges 25 percent less per unit of CPU in its virtualized environment. These benefits have helped justify...
Case Study
Capacity Planning at a Czech Bank
Organization Description: In the Czech Republic this bank serves more than 3 million clients and employs over 8000 workers. The bank operates a very extensive IT infrastructure which requires round-the-clock accessibility checks and computing capacity planning.
Business Value of Vityl Capacity Management: The Vityl capacity planning solution has given the bank full control over the operations of...
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Case Study
How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Case Study
Hershey Entertainment Quickly Encrypts Credit Card Data with Powertech Encryption for IBM i
Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...
Case Study
Field-level Encryption Helps Retail Chain Achieve PCI Compliance
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
Article
Detect Devices Your Way in Intermapper 6.1
By Kevin Jackson on Thu, 11/24/2016
Intermapper 6.1 makes detecting new devices easier, more accurate, and faster than ever. Get a full review of Intermapper 6.1’s features and how to try them out.
Article
4 Reasons to Add VTLs
By Tom Huntington on Tue, 08/30/2016
Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Article
Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i
By Robin Tatam on Sun, 08/21/2016
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Case Study
DFS Inc. Manufactures Feed 24/7 with Network Monitoring
Find out how one of Iowa’s largest feed suppliers maintains 24/7 operations with real-time network visibility thanks to Intermapper.