Resources

Blog

PCI Compliance is Only the Beginning of Security

The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog

What to Know about the New NIST Cybersecurity Framework

Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Blog

How DR Compliance Requirements Impact HA Decisions

Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Blog

What Can IBM i Offer IT's Young Guns?

IT personnel naturally have their fingers on the pulse of today's innovations and one eye fixed on the future. As a result, each rising generation of systems administrators and application developers seems convinced that they know better than their forefathers and can remedy all kinds of issues with new tools and tricks. Unfortunately, this appetite for innovation can cause overzealous...
On-Demand Webinar

Aging RPG Programmers in Charge of Your IBM i?

Not all IBM i experts are created equal. Programmers, developers, operators, and system administrators each have a specific skillset that keeps your business running smoothly. When one resource retires, don't burden another with the additional workload. Think long-term and look to automation instead.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar

Recruiting IBM i Pros in the 21st Century

If your IBM i expert is looking toward retirement, you’ll want to know what IBM i skills—and salary requirements—are out there. Watch this webinar and learn how a forward-thinking data center can attract new talent.
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

Viably IBM i for ERP

Your ERP decision could make or break your company, so it’s essential to get it right the first time. If you’re considering an ERP change or questioning why IBM i, watch this!