Trial
Start Your Free Trial of Powertech Policy Minder for IBM i
See for yourself what Powertech Policy Minder for IBM i can do during your free software trial. This is your opportunity to check out key features and experience the benefits first-hand:
Improve your security posture by automating adherence to your security policy
Eliminate manual tasks involved in documenting, checking, and reporting on your security policy
Meet compliance mandates that...
On-Demand Webinar
Securing Your IBM i for GDPR Compliance
Now is the time to take stock of your IBM i security controls and evaluate what the GDPR means for you
Demo
Request a Live Demonstration of Powertech Antivirus for IBM i
See for yourself how Powertech Antivirus for IBM i helps protect your IBM i systems from modern virus threats and malicious code. Our team of software experts would love to discuss what you’re looking for and show you what Powertech Antivirus for IBM i can do.
Your live demo will include:
An overview of the core benefits and features of Powertech Antivirus for IBM i
A live demonstration
...
Demo
Request a Live Demo of the IBM i Security GDPR Bundle
The GDPR deadline has passed, but this law certainly hasn’t become less important. Being GDPR compliant and staying GDPR compliant is as critical now as ever—and it means we need to learn a totally new approach when processing and securing personal data.
With the IBM i Security GDPR Bundle, you can:
Prevent unauthorized data access
Ensure appropriate personnel can view, update, or read...
GoAnywhere Gateway
Implement an extra layer of cybersecurity when exchanging files with trading partners.
On-Demand Webinar
Expert Tips for Securing AIX Systems: Beyond the Basics
By Bob Erdman
In this second session in our series on creating and using AIX security policies, cybersecurity expert Bob Erdman explains next-level AIX security issues.
Blog
How Spectre and Meltdown Affect Power Systems Servers
Thu, 02/08/2018
The Spectre and Meltdown vulnerabilities do affect Power Systems servers. Fortra security expert explains what we know so far and how you can stay up-to-date on patches released by IBM.
On-Demand Webinar
Reduce the Cost and Effort of IBM i Auditing
By Robin Tatam
IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
Guide
Download "Childhood's End: Attackers Increasingly Take Aim at Linux Systems"
Like the wide-eyed humans who mistakenly trust their benevolent alien overlords in Arthur C. Clarke’s science-fiction classic, Linux users the world over are beginning to awaken to the reality that their malware- free utopian childhood is rapidly coming to an end.
A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes since 2015 means the...
On-Demand Webinar
Expert Tips for Securing AIX Systems: Controlling User Access
By Bob Erdman
Watch this one-hour session to learn how to start creating an effective AIX security policy related to controlling user access.
On-Demand Webinar
A Shockingly Easy Way to Save Money with IBM i Passwords
By Robin Tatam
When users are unable to sign on to IBM i, productivity stops. Watch this on-demand webinar to learn a simple way to get IBM i users back to work when passwords are forgotten or entered incorrectly.
Blog
NIST’s Surprising New Password Recommendation
By Robin Tatam on Fri, 01/05/2018
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog
Hidden Dangers of the Lesser-Known IBM i Special Authorities
Fri, 01/05/2018
Everyone’s aware of the dangers of *ALLOBJ, *SECADM, and *SPLCTL special authorities. But what about the rest? Fortra security expert explains the issues you should be aware of when assigning the other special authorities.
On-Demand Webinar
Lessons from 2017’s Top Security Threats
By Robin Tatam
This year of record-breaking breaches forces the rest of us to determine what we can learn from a series of unfortunate events that allowed hackers and attackers to slink away with our data.
Blog
Could IBM i Have Been Part of the Equifax Breach?
Tue, 11/28/2017
If IBM i was part of the Equifax data breach, what could that organization have done to protect their data? Fortra security expert has some ideas.