Resources

Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with...
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Case Study

Field-level Encryption Helps Retail Chain Achieve PCI Compliance

Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors. “We need to be able to access credit card...
On-Demand Webinar

Deploy Robot Automation Dashboards with Sequel

Sequel Data Access isn’t just for compiling sales numbers or creating easy-to-read dashboards. It’s perfectly equipped to compile real-time performance indicators using a detailed operations history from your Robot products.  Track results from Robot Schedule, Robot Save, and Robot Console through automated, graphical dashboards, such as: Number of Robot Schedule jobs run, completion statuses,...