Blog
How to Generate Revenue in AP
Tue, 08/28/2018
Accounts Payable not only doesn't have to be a cost center these days. But automating AP can actually make it a profit center.
Blog
The Top Benefits of Accounts Payable Automation
By Richard Schoen on Wed, 08/15/2018
There's no place for paper in today's AP processes. Find out how to save time and money with AP automation.
Datasheet
Webdocs for AP
Webdocs streamlines invoice processing by capturing invoices electronically and routing them through every step of your accounts payable (AP) workflow.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Datasheet
MQ Manager
MQ Manager continuously and automatically monitors the seven key components of IBM MQ in order to ensure the flow of data is not disrupted, prevent costly downtime, free up IT resources and reduce operational cost.
Datasheet
Intermapper App for Splunk Enterprise
If you need proactive network monitoring and visual mapping, Intermapper will give you real-time knowledge of your network, affordably and with seamless integration into Splunk.
Article
6 Enhancements in IBM i Server Suites Version 7
By Paul Ratchford on Fri, 06/23/2017
What's new in version 7 of IBM i Server Suites? Read this article to find out.
Article
Seven Key Components of IBM WebSphere MQ and What to Watch
By Seven Key Components of IBM WebSphere MQ and What to Watch on Wed, 05/10/2017
Minimize business risk by ensuring that the flow of critical data is not interrupted. Learn what you should be monitoring in IBM WebSphere MQ.
Blog
Customer Success: Streamlining AP Invoice Capture
By Richard Schoen on Tue, 03/21/2017
AP invoice capture doesn't need to be complicated. For one of our customers, it was easy—read the blog post to learn more.
Blog
Your Biggest Challenge to IBM i User Onboarding
By Robin Tatam on Mon, 03/06/2017
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Blog
Checklist: What to Look For in AP Automation Software
By Richard Schoen on Tue, 01/24/2017
What should you look for in AP automation software?
Blog
Current Trends in Accounts Payable
By Richard Schoen on Thu, 01/05/2017
Find out if you're keeping up with current trends in account payable processes.
On-Demand Webinar
A Primer on IBM i User Profiles and How To Deploy Them
By Robin Tatam
Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data.
On-Demand Webinar
AP 101: How to Automate Your AP Processes and Improve ROI
Tired of time-consuming AP processes? Watch this webinar to learn how to automate them with a document management system!
On-Demand Webinar
The Three Levels of AP Automation
By Bill Whalen
Is your company ready to automate its AP processes? Which level will best meet your needs: simple, advanced, or full? Watch this presentation to learn how to choose the best fit for your company.
Article
Intermapper Application for Splunk Answers Need for Log Analytics in Network Management
By Shamus McGillicuddy on Wed, 09/07/2016
The Intermapper application for Splunk brings together Intermapper's robust network monitoring software with Splunk's high-powered searches and analysis of data stores.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.