Datasheet
Powertech Database Monitor for IBM i
Powertech Database Monitor for IBM i leverages IBM i to automate, streamline, and centralize your database monitoring while providing full notification, authorization, reporting, and regulatory compliance capabilities. Schedule a demo today.
Blog
How to Automate Security Policy Enforcement
By Robin Tatam on Wed, 10/18/2017
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
On-Demand Webinar
Give Your Organization IBM i Data in a Browser
Find out how to give your organization access to real-time IBM i data no matter where they are.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article
How-To: Get Started with Sequel Web Server for Client Tables and More
Wed, 02/22/2017
Learn how to extend Sequel Data Access across your organization with Sequel Web Interface and Sequel Web Server.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Mark Geery, CIO of Tony’s Fine Foods, Shares Success with Sequel
By Mark Geery
In this session Mark Geery, CIO of Tony’s Fine Foods will discuss how they have used Sequel in their business.
On-Demand Webinar
Are IBM i monitoring limitations leaving your data exposed?
In this era of cyberattacks, IBM i limitations could leave data vulnerable. Watch this 30-minute webinar where we explore the key reasons why.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
How to Use the SEQUEL ViewPoint Repository to Your Advantage
Mon, 06/27/2016
With the new SEQUEL ViewPoint repository, it’s easier than ever to manage, find, and run your SEQUEL objects. Learn more about the benefits of the repository.
Case Study
Fortra Meets IT Security Needs for Napa Recycling and Waste Services
Napa Recycling and Waste Services (NRWS) provides recycling and waste collection to businesses and residents in the City of Napa and southern unincorporated Napa County. The entire county, with 90 percent of its agricultural land devoted to viticulture, is home to more than three hundred wineries in the Napa Valley, and is one of the top wine producing areas of the United States. In addition, the...
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
Case Study
Policy Minder Helps Amway Remove the Guesswork from PCI Security Compliance
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.