Resources

On-Demand Webinar

Simple Strategies for Malware Defense on IBM i - presented with COMMON

With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux. Watch this webinar to learn about advanced malware threats and simple...
Guide

Penetration Testing Toolkit

Safeguard your infrastructure and data With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources...
Guide

2021 Pen Testing Survey Report

Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose. The 2021 Pen Testing Report highlights...
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar

Cybersecurity Trends in 2019 and Predictions for 2020

Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Datasheet

Powertech Antivirus for IBM i

Native Protection for IBM i Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus. Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Datasheet

Powertech Identity Manager for IBM i

Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Blog

Building a Better Virus Trap

Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.