Resources

Datasheet

Powertech Exit Point Manager for IBM i

Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today. Your Greatest Threat May Come from Within In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Datasheet

Core Privileged Access Manager (BoKS)

Learn more about a critical Systems and Data Access Management Software for Linux and UNIX. Schedule a demo of Core Privileged Access Manager (BoKS) today.
Blog

What GDPR Fines Mean for IBM i

The EU’s General Data Protection Regulation (GDPR) has changed the way organisations around the world approach data security. Even if your centre of operations is nowhere near Europe, you must take stock of your IBM i security controls and evaluate what this compliance law means for you if you are processing personal data from people located in the European Union. The GDPR deadline has passed, but...
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Datasheet

Powertech Multi-Factor Authentication Compliance Datasheet

Comply with Security Standards, Including PCI DSS The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
On-Demand Webinar

Meeting GDPR Compliance with Robotic Process Automation

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018 . Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...
Article

Eight Steps Toward a Secure Hybrid Cloud Environment

Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
On-Demand Webinar

Expert Tips for Avoiding AIX Security Mistakes

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Article

Generate and Distribute Audit Reports Automatically

Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.