Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
Blog
5 Quick Wins for Document Management this Year
By Richard Schoen on Tue, 01/15/2019
Do you need document management in 2019? Discover five quick wins that make it easy to get started.
Datasheet
Security Scan for IBM i
Security Scan for IBM i is a free service centered on Fortra’ expertise with the IBM i platform and its unique security concerns.
Datasheet
Powertech Encryption for IBM i
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
On-Demand Webinar
How to Integrate GoAnywhere with Document Management Solutions
With GoAnywhere's Webdocs Cloud Connector, you can direct your files from different sources into Webdocs, then set up workflows for order processing, invoice approval, employee onboarding, and more!
Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.
Blog
What is an Electronic Document Management System (EDMS) and Why Do I Need One?
By Greg J. Schmidt on Thu, 06/14/2018
An EDMS (electronic document management system) provides a way to capture, manage, and retrieve your documents. Learn why it's time to get one.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Blog
Next Steps for Replacing IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
You know you need to replace IBM Content Manager. But you don’t know where to start…
Blog
How to Migrate from IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
There’s more to replacing IBM Content Manager than just finding a new solution. You also need to migrate those documents…
Blog
The End is Near for IBM Content Manager for iSeries…
By Greg J. Schmidt on Fri, 01/19/2018
IBM Content Manager for iSeries went out of support on September 30. Are you ready?
Blog
Could Ransomware Like WannaCry Hit IBM i?
Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
Datasheet
Webdocs
Webdocs helps you streamline your business processes by managing the entire document lifecycle digitally. That makes it easier for everyone at your organization to get the information they need anytime, anywhere (as long as they’re authorized).
Capture Every Document
Automate the document capture process—no matter how you receive documents. With Webdocs, you can go beyond just scanning and...
On-Demand Webinar
5 Quick Wins for Capturing Documents
Documents are everywhere in your organization. But capturing them is a challenge. Until now...