Datasheet
Powertech Antivirus
Powertech Antivirus offers the power and protection of an industry-leading scan engine while supporting the specific features of your operating systems. Schedule a demo today.
Datasheet
Powertech SIEM Agent for IBM i
Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Deploy Robot Automation Dashboards with Sequel
Sequel Data Access isn’t just for compiling sales numbers or creating easy-to-read dashboards. It’s perfectly equipped to compile real-time performance indicators using a detailed operations history from your Robot products.
Track results from Robot Schedule, Robot Save, and Robot Console through automated, graphical dashboards, such as:
Number of Robot Schedule jobs run, completion statuses,...
On-Demand Webinar
Execute Sequel Scripts and Reports Automatically—with Robot Schedule
Learn how to turn your Sequel scripts and reports into an automated job stream.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Helps the Seneca Nation Play the Security Game
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...