Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private information...
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
The Three Scariest Things About NOT Going Paperless
By Bill Whalen on Wed, 03/29/2017
Are you afraid of going paperless? Overcome your fear—and learn about the frightening consequences of not going paperless.
On-Demand Webinar
Getting Started with Document Management: The Right Plan
Getting started with document management doesn’t need to be complicated. Make it easy—watch this on-demand webinar.
Blog
Compare Powertech Encryption for IBM i to IBM's Cryptographic APIs for Encrypting Database Fields
By Bob Luebbe on Fri, 03/17/2017
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Blog
4 Reasons You Need Native Virus Scanning
By Robin Tatam on Thu, 03/09/2017
Many Power Systems users still believe Linux, AIX, and IBM i are immune to viruses because viruses are a Windows threat. That’s not the case in today’s connected environments.
Article
How Object Integrity Scanning Enhances IBM i Security
Tue, 03/07/2017
IBM i has had superior built-in security features from the beginning. However, as internetworking increases and open protocols and servers become the norm, additional protection is needed.
Blog
Why Document Management Projects Fail
By Greg J. Schmidt on Mon, 03/06/2017
Find out how to make sure your document management project is a success.
Case Study
Hershey Entertainment Quickly Encrypts Credit Card Data with Powertech Encryption for IBM i
Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...
Case Study
Field-level Encryption Helps Retail Chain Achieve PCI Compliance
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
Case Study
Appvion Improves Customer Satisfaction with a Digital Document Repository
Appvion, Inc. manufactures paper—thermal, carbonless, security, inkjet, digital specialty and colored papers. But this Appleton, Wisconsin-based company had a problem when it came to digital documents in their customer web portal. Their existing system just wasn’t up to snuff. It was time to make a change.
...
Blog
The Problem with AFP Forms…
Wed, 01/25/2017
What’s wrong with AFP forms? And is it really time to replace them? Find out.
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...
On-Demand Webinar
IBM i Meets Mobile Technology
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Case Study
Major Steel Supplier Strikes Gold with a Document and Forms Management Solution and Superb Support
Paperwork and steel go hand-in-hand for one major steel supplier (MSS) with locations across North America. Every piece of steel they ship includes paperwork assuring customers of the quality of the product they’re receiving.
But MSS had a problem: their processes were keeping them from meeting customer expectations. It was time to make a change.
...
Blog
3 Easy Steps to Kickstart Your Electronic Document Management Journey
By Greg J. Schmidt on Mon, 11/14/2016
Not sure where to begin with electronic document management? Start here. Take three easy steps and make document management simple again.