Blog
Data Classification Best Practices
Mon, 06/14/2021
Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
What does CUI mean for government agencies?
Fri, 05/21/2021
Adam Strange, global marketing director at Titus, by Fortra, discusses what Controlled Unclassified Information (CUI) means for government agencies.
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Datasheet
Powertech Identity Manager for IBM i
Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Blog
Your Biggest Challenge to IBM i User Onboarding
By Robin Tatam on Mon, 03/06/2017
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
On-Demand Webinar
A Primer on IBM i User Profiles and How To Deploy Them
By Robin Tatam
Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data.
On-Demand Webinar
Save 5 Hours a Day by Integrating RPG to SQL Server, Excel, and Other Databases
Watch this webinar to learn how quickly you can integrate data across SQL Server and other databases, as well as Excel.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.