Guide
Controlling SQL Updates Using Powertech Exit Point Manager for IBM i
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without any control by the...
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog
The 9 Server Sprawl Questions You Need to Ask
Mon, 06/27/2016
For budding companies, server sprawl may be just one of many growing pains—a temporary inconvenience for a greater good. But if you’re struggling to complete processes on time, stalling with the auditors, and jumping from server to server whenever an error occurs, it’s time to ask the tough questions.
Blog
The #1 Step Before Automation
Fri, 06/10/2016
An up-to-date and comprehensive runbook won't win you any awards. But when you get the green light to implement a workload automation tool, documentation is your lifeline. Unfortunately, most runbooks aren’t up to snuff.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study
Powertech Protects City Data and Vital Services with System i Security
The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Automated Solutions Help Bank of Stockton Improve Security and Compliance
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...
Case Study
Powertech Helps the Seneca Nation Play the Security Game
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...
Case Study
Service Corp Company Benefits From Automation
"Automate Schedule's audit log is crucial to us because one of our SOX controls is to validate that we keep schedule logs for a certain period of time. An audit log is critical for a scheduler."
Blog
Email Integration and Automation in Customer Relationship Management
Wed, 04/18/2012
Automate handled the repetitive work that otherwise bogged down our manager and the entire sales department by automating the process of inbound email inquiries.
Pagination
- First page
- Previous page
- 1
- 2
- 3
- 4
- 5
- 6
- 7