Guide
Penetration Testing Toolkit
Safeguard your infrastructure and data
With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing...
Guide
2021 Pen Testing Survey Report
Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose.
The 2021 Pen Testing...
Guide
Integrating IBM i Security Events into Your SIEM
This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
Guide
Powertech Password Self Help for IBM i: Self-Service Password Reset
Resetting disabled passwords is an inevitable activity. Read this guide to find out you can reduce password management costs and increase efficiency with an easy-to-use tool that allows IBM i users to reset their own passwords.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual...
Guide
Effective Log Management
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of...
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Two Factor Authentication for IBM i
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...
Case Study
Fortra Meets IT Security Needs for Napa Recycling and Waste Services
Napa Recycling and Waste Services (NRWS) provides recycling and waste collection to businesses and residents in the City of Napa and southern unincorporated Napa County. The entire county, with 90 percent of its agricultural land devoted to viticulture, is home to more than three hundred wineries in the Napa Valley, and is one of the top wine producing areas of the United...
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds....
Case Study
AAA Life Leverages Fortra Solutions for IT Efficiency
Part of the American Automobile Association (AAA) family, AAA Life Insurance Company offers a variety of competitive life insurance, annuity, and travel accident products. With over one million policies, many people rely on AAA Life to help provide protection for their loved ones.
As Senior Systems Engineer at AAA Life, Randy Wittner is in charge of their IBM i environment,...
Case Study
Policy Minder Helps Amway Remove the Guesswork from PCI Security Compliance
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study
Powertech Helps C&D Technologies Achieve AS/400 SOX Compliance
As a publicly traded company with a lean IT department, C&D Technologies has been greatly impacted by Sarbanes-Oxley (SOX) regulations. Despite its size, the IT department needed to comply with these regulations through better user management, monitoring, and reporting...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.