In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
For budding companies, server sprawl may be just one of many growing pains—a temporary inconvenience for a greater good. But if you’re struggling to complete processes on time, stalling with the auditors, and jumping from server to server whenever an error occurs, it’s time to ask the tough questions.
An up-to-date and comprehensive runbook won't win you any awards. But when you get the green light to implement a workload automation tool, documentation is your lifeline. Unfortunately, most runbooks aren’t up to snuff.
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
"It's incredible the different devices that InterMapper can monitor. We use some really unique equipment and InterMapper handles it all with ease." - Vince Hurst, Communications Technician, Sheriff Department, TCOMM Bureau
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...
"Automate Schedule's audit log is crucial to us because one of our SOX controls is to validate that we keep schedule logs for a certain period of time. An audit log is critical for a scheduler."
Automate handled the repetitive work that otherwise bogged down our manager and the entire sales department by automating the process of inbound email inquiries.