Resources

Blog

The Shared Responsibility of Cloud Security

The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Datasheet

Powertech Password Self Help for IBM i

Powertech Password Self Help for IBM i enables users to reset their own IBM i passwords immediately, improving user productivity and reducing the demand placed on IT. Schedule a demo today.
Datasheet

Powertech Encryption for IBM i

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Datasheet

Powertech Exit Point Manager for IBM i

Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today. Your Greatest Threat May Come from Within In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Blog

How SIEM Protects Cloud Servers

Security information and event management (SIEM) applications help IT professionals oversee their vast technology infrastructures, including cloud repositories. SIEM applications aggregate data from many different types of systems to present a clear view of the actionable security tasks your team must address to protect your business.
Guide

Choosing the Right SIEM Solution to Face Today's Security Challenges

What Makes a SIEM Solution Effective? SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind. Given the immense benefits and an increase in the number of SIEM...
Datasheet

Powertech Encryption for IBM i Compliance Datasheet

Satisfy Stringent Requirements for Encryption and Key Management Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

    Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
Blog

NIST’s Surprising New Password Recommendation

For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.