Resources

Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with...
On-Demand Webinar

2021 Business Intelligence Week

Watch this webinar series for your FREE opportunity to learn what every user should know about Sequel Data Access, plus advanced tips and tricks for improved IBM i (iSeries, AS/400) business intelligence.
On-Demand Webinar

Data Security Challenges: How Our Suite Helps

Data security is hard. We’re not going to sugarcoat it.  In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps...
Blog

How to remove the data security risk from file transfers

Organizations that allow the use of free or unsecured file transfer services not only leave themselves vulnerable to data loss, ransomware and a whole range of other cyber threats, but they have no control or visibility of what information is being transferred and who receives it.