Resources

Guide

Download "IBM i User Provisioning"

Even when user profiles are painstakingly set up, keeping them consistent and secure can be an uphill battle. All it takes is one over-privileged user and your most critical data could be changed, deleted, or worse. You need help—not only to set up new users with discretion, but also to keep them consistent across roles, departments, and systems. Our exclusive white paper includes expert advice...
Guide

Top Security Issue for the Integrated File System (IFS)

The IFS is one of the most ignored parts of the system, yet it enables many of the most powerful and most used features on IBM i today. Overlooking the ways in which IBM i utilizes the IFS could weaken your security.
Press Release

Fortra Acquires Safestone Technologies Ltd.

Safestone Technologies is the 3rd acquisition for Fortra this year. Safestone Technologies’ experience in security, auditing, and compliance solutions complements the mission of PowerTech, a division of Fortra.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Blog

What’s New in IBM i 7.2?

May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Article

Where to Start with IBM i Operations

Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
Blog

Is Your Team A Little Rusty on IBM i Operations?

Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Article

What's New for Security in IBM i 7.1

IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.