Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
On-Demand Webinar
8 Items to Consider When Switching ERPs
By Tim Dunn
This webinar with HarrisData and Fortra covers the eight questions to consider when you switch enterprise resource planning (ERP) systems.
Blog
What is an Electronic Document Management System (EDMS) and Why Do I Need One?
By Greg J. Schmidt on Thu, 06/14/2018
An EDMS (electronic document management system) provides a way to capture, manage, and retrieve your documents. Learn why it's time to get one.
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
Datasheet
Webdocs for AP
Webdocs streamlines invoice processing by capturing invoices electronically and routing them through every step of your accounts payable (AP) workflow.
Blog
Next Steps for Replacing IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
You know you need to replace IBM Content Manager. But you don’t know where to start…
Blog
How to Migrate from IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
There’s more to replacing IBM Content Manager than just finding a new solution. You also need to migrate those documents…
Blog
The End is Near for IBM Content Manager for iSeries…
By Greg J. Schmidt on Fri, 01/19/2018
IBM Content Manager for iSeries went out of support on September 30. Are you ready?
Datasheet
Webdocs
Webdocs helps you streamline your business processes by managing the entire document lifecycle digitally. That makes it easier for everyone at your organization to get the information they need anytime, anywhere (as long as they’re authorized).
Capture Every Document
Automate the document capture process—no matter how you receive documents. With Webdocs, you can go beyond just scanning and...
On-Demand Webinar
5 Quick Wins for Capturing Documents
Documents are everywhere in your organization. But capturing them is a challenge. Until now...
Blog
What is Document Management?
By Richard Schoen on Tue, 11/07/2017
Document management is the process of capturing, managing, and distributing electronic documents. But there’s more to it than that…
Blog
What Digital Transformation Means for Your Documents
By Richard Schoen on Wed, 10/25/2017
Digital transformation is everywhere. But what does it mean for your documents?
Datasheet
Event Manager
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Schedule a demo today.
Blog
3 Signs You Should Be Storing Documents in the Cloud
By Greg J. Schmidt on Tue, 10/10/2017
Should you be storing documents in the cloud? Or keeping them on-premises?
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Blog
How to Balance Document Accessibility with Security
By Greg J. Schmidt on Wed, 09/13/2017
Giving people access to documents is important. But so is document security. Find out how to do both.
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...