Resources

On-Demand Webinar

Deploying Multi-Factor Authentication in Your Enterprise

Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense. MFA protects you from the most common cause of a data breach: compromised...
Case Study

Automate Eliminates Custom Visual Basic Code for InfraSource

InfraSource Services is a fully integrated company providing construction services in gas and electric transmission, gas and electric distribution, telecommunications, and water and wastewater systems. The organization consists of several distinct operating companies strategically located throughout the United States. InfraSource is a single source provider of infrastructure construction services....
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.