On-Demand Webinar
Transform Accounts Payable Processes with AP Automation
Find out how to pay invoices faster, make vendors happy, and keep your budget on track.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
On-Demand Webinar
Automating AP with Completely Paperless Invoice Processing
A comprehensive Accounts Payable document solution will improve your data integrity, speed up your document routing, and make payment processing painless.
On-Demand Webinar
How to Take a Planned Approach to Document and Forms Management for AP
Watch our on-demand webinar to learn the smartest way to implement document and forms management solutions for Accounts Payable (AP).
Datasheet
Powertech Compliance Monitor for IBM i
Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Schedule a demo today.
Blog
How to Generate Revenue in AP
Tue, 08/28/2018
Accounts Payable not only doesn't have to be a cost center these days. But automating AP can actually make it a profit center.
Blog
The Top Benefits of Accounts Payable Automation
By Richard Schoen on Wed, 08/15/2018
There's no place for paper in today's AP processes. Find out how to save time and money with AP automation.
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Datasheet
Webdocs for AP
Webdocs streamlines invoice processing by capturing invoices electronically and routing them through every step of your accounts payable (AP) workflow.
On-Demand Webinar
Reduce the Cost and Effort of IBM i Auditing
By Robin Tatam
IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
Guide
Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
Download this guide...
Article
Generate and Distribute Audit Reports Automatically
By Robin Tatam on Mon, 04/03/2017
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.
Blog
Customer Success: Streamlining AP Invoice Capture
By Richard Schoen on Tue, 03/21/2017
AP invoice capture doesn't need to be complicated. For one of our customers, it was easy—read the blog post to learn more.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog
PCI Compliance Takeaways from the Target Data Breach
By Robin Tatam on Wed, 03/08/2017
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?