Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
cta_page
Free Virus Scan
Detect and neutralize threats to your IBM i, AIX, Linux, LinuxONE, and/or Linux on IBM Z servers with a free virus scan.
Virus attacks to your server can’t be prevented and no platform is immune. Responding to viruses and removing them is the only way to reduce the risk of costly damage to your organization. This is why government and industry regulations require anti-virus protection on all...
Blog
What is EdTech? A Snapshot of Modern Tech in Schools
By Kevin Jackson on Fri, 08/12/2016
In 2016, technology in schools is on the rise. Read the article for a snapshot of what EdTech is and how it’s growing.
Blog
Lessons Learned from the Telstra Network Outages
By Kevin Jackson on Thu, 08/11/2016
Real-life network outages are a wake-up call to brands who aren’t taking precautionary measures. Here's what happened to Telstra customers, what Telstra did wrong, and how your business can avoid such a devastating, costly situation.
Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.
Press Release
HelpSystems (now Fortra) Fills Encryption Gap With Linoma Buy
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
cta_page
Compliance Assessment for IBM i
Compliance mandates, like CCPA (California Consumer Privacy Act), GDPR, HIPAA, and PCI DSS, set minimum requirements for cybersecurity. If your IBM i (System i®, iSeries®, AS/400®) is not properly configured, sensitive data is vulnerable—and that vulnerability is an indicator of out-of-compliance security settings.
Our free compliance assessment uses the Powertech Security Scan to identify and...
Blog
11 Things To Know About IPv6 Transitions
By Kevin Jackson on Mon, 08/01/2016
Benefit from the collective wisdom we’ve complied from IT professionals and learn a thing or two (or 11) about IPv6 transitions.
Guide
Self-Audit: Checking Assumptions at the Door
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
Case Study
Medical Device Company Ensures Uptime with Intermapper
Here’s how Intermapper’s functionality, price point, and real-time alerts make it easy for this company to prove ROI.
Case Study
DFS Inc. Manufactures Feed 24/7 with Network Monitoring
Find out how one of Iowa’s largest feed suppliers maintains 24/7 operations with real-time network visibility thanks to Intermapper.
Case Study
Georgian College’s Network Infrastructure Group Uses Intermapper to Map, Monitor, and Alert
Using Intermapper, this leading Ontario college keeps 7 remote campuses connected and fixes network issues faster through real-time monitoring.
Article
Don’t Be Exposed In *PUBLIC!
Mon, 06/27/2016
Security typically operates so that users who are not granted authority have no authority. IBM i security, however, has a unique concept known as *PUBLIC.
Article
What's New for Security in IBM i 7.1
By Robin Tatam on Mon, 06/27/2016
IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Case Study
Fortra Meets IT Security Needs for Napa Recycling and Waste Services
Napa Recycling and Waste Services (NRWS) provides recycling and waste collection to businesses and residents in the City of Napa and southern unincorporated Napa County. The entire county, with 90 percent of its agricultural land devoted to viticulture, is home to more than three hundred wineries in the Napa Valley, and is one of the top wine producing areas of the United States. In addition, the...
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...