Article
A Modern Approach to Performance Management
Wed, 08/24/2016
Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Article
Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i
By Robin Tatam on Sun, 08/21/2016
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Effective Log Management
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Two Factor Authentication for IBM i
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog
Say Goodbye to Document Mismanagement
Thu, 07/28/2016
We write a lot on this blog about document management, but this time we wanted to share a graphic illustrating the struggles that some companies and individuals still face in their processes.
Can you see yourself (or your company) in any of these stats? If so, let us help you find a solution!
With RJS, your company can digitize...
Case Study
AAA Life Leverages Fortra Solutions for IT Efficiency
Part of the American Automobile Association (AAA) family, AAA Life Insurance Company offers a variety of competitive life insurance, annuity, and travel accident products. With over one million policies, many people rely on AAA Life to help provide protection for their loved ones.
As Senior Systems Engineer at AAA Life, Randy Wittner is in charge of their IBM i environment, overseeing two S824...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
A Document Management Solution Boosts Efficiency at Wise Alloys
Find out how Wise Alloys automated lot ticket processing, cut costs, and boosted employee productivity.
Case Study
Fortra Automates Report Delivery at Ullico
Reports are an essential part of all businesses. Among other purposes, they help organizations to better manage and control their operations. But what if managing those documents placed an unnecessary burden on the enterprise? Paper-based reports do exactly that.
Case Study
Fortra Document Management Helps TPi Fit the Bill
When TPi began to evaluate opportunities in this area, customers were not yet battering down the doors demanding electronic invoices and statements, but the company recognized the market trends and proactively decided to provide Web access for many of the documents it produces.
Case Study
Toter Trashes Burdensome Paper Flows Results
Toter sells primarily to municipalities, but also to private haulers. That business generates a large number of documents in the form of bids, proposals and contracts. Warrantees associated with contracts can last for as long as 10 years. Consequently, the related documents must be retained for a considerable time.
Case Study
Southern Waste Systems Achieves Fast ROI with iForms
Paper slowed down receipt processes at Southern Waste Systems. See how they sped up their processes and achieved fast ROI with iForms electronic forms.
Case Study
Skidmore Sales Feeds Quality Document Management
Food quality and safety is a paramount concern for everyone from farmers and food processers to end-consumers, and everyone in between. Not surprisingly, ensuring food quality requires the management of a considerable volume of documents.
Case Study
Schaumburg School District Learns about Document Protection from Fortra
All organizations must take into account two important characteristics of documents. First, the information they contain is often invaluable. Second, paper burns. These two traits were on the school district’s mind when it decided to look for a way to better protect critical personnel documents.
Case Study
Fortra Tunes-Up Information Flows at Roland
Traditionally, the road between an instrument-maker and music-makers was paved, in part, with paper. For example, Roland stores over 200,000 pages of legal documents alone. Because they were stored on paper, searching through them to find a specific document was time consuming.