Resources

Blog

10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be exceedingly complicated. But they don’t have to be—as...
Guide

Penetration Testing Toolkit

Safeguard your infrastructure and data With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources to...
Guide

2021 Pen Testing Survey Report

Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose. The 2021 Pen Testing Report highlights...
Blog

Recommended QSECURITY Level for IBM i

The system security level (QSECURTY) sets the overall tone for your IBM i security posture. Read this blog post to learn how many organizations are following IBM's best practices.
Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study , which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here .
On-Demand Webinar

5 Myths About Encryption on IBM i

In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and PowerLinux...