Resources

On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Case Study

Appvion Improves Customer Satisfaction with a Digital Document Repository

Appvion, Inc. manufactures paper—thermal, carbonless, security, inkjet, digital specialty and colored papers. But this Appleton, Wisconsin-based company had a problem when it came to digital documents in their customer web portal. Their existing system just wasn’t up to snuff. It was time to make a change.
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that distract from other critical projects? We...
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...
Blog

Say Goodbye to Document Mismanagement

We write a lot on this blog about document management, but this time we wanted to share a graphic illustrating the struggles that some companies and individuals still face in their processes. Can you see yourself (or your company) in any of these stats? If so, let us help you find a solution! With RJS, your company can digitize documents and electronically store your files, while creating a...
Case Study

Fortra Automates Report Delivery at Ullico

Reports are an essential part of all businesses. Among other purposes, they help organizations to better manage and control their operations. But what if managing those documents placed an unnecessary burden on the enterprise? Paper-based reports do exactly that.