Resources

Guide

Download “Identity & Access Management for IBM i”

      Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world...
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog

Say Goodbye to Document Mismanagement

We write a lot on this blog about document management, but this time we wanted to share a graphic illustrating the struggles that some companies and individuals still face in their processes. Can you see yourself (or your company) in any of these stats? If so, let us help you find a solution!           With RJS, your company can digitize...
Case Study

Fortra Automates Report Delivery at Ullico

Reports are an essential part of all businesses. Among other purposes, they help organizations to better manage and control their operations. But what if managing those documents placed an unnecessary burden on the enterprise? Paper-based reports do exactly that.
Case Study

Fortra Document Management Helps TPi Fit the Bill

When TPi began to evaluate opportunities in this area, customers were not yet battering down the doors demanding electronic invoices and statements, but the company recognized the market trends and proactively decided to provide Web access for many of the documents it produces.
Case Study

Toter Trashes Burdensome Paper Flows Results

Toter sells primarily to municipalities, but also to private haulers. That business generates a large number of documents in the form of bids, proposals and contracts. Warrantees associated with contracts can last for as long as 10 years. Consequently, the related documents must be retained for a considerable time.