Resources

Datasheet

Powertech SIEM Agent for IBM i

Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Datasheet

Powertech Database Monitor for IBM i

Powertech Database Monitor for IBM i leverages IBM i to automate, streamline, and centralize your database monitoring while providing full notification, authorization, reporting, and regulatory compliance capabilities. Schedule a demo today.
Datasheet

Powertech Command Security for IBM i

Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
Datasheet

Powertech Multi-Factor Authentication

Powertech Multi-Factor Authentication is a robust MFA solution for IBM i (AS/400, iSeries), it is a simple and effective way to ensure the users accessing your systems are who they say they are. Schedule a demo today.
Datasheet

Powertech Encryption for IBM i

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Datasheet

Powertech Authority Broker for IBM i

Satisfy your auditor requirements with reports that provide a complete audit trail of privileged user activity with Powertech Authority Broker for IBM i. Schedule a demo today.
Datasheet

Powertech Exit Point Manager for IBM i

Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today. Your Greatest Threat May Come from Within In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Datasheet

Powertech Multi-Factor Authentication Compliance Datasheet

Comply with Security Standards, Including PCI DSS The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
Datasheet

Powertech Encryption for IBM i Compliance Datasheet

Satisfy Stringent Requirements for Encryption and Key Management Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Blog

Protect Your Administrator Accounts from Abuse

Attackers often use malware to exploit user credentials and gain access to sensitive data. Properly securing admin accounts is an important line of defense you don't want to ignore. Read on to learn how.
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.