Press Release
Almost Two-Thirds of Financial Services Firms Have Suffered a Cyber-attack in the Last 12 Months
65% of large Financial Services (FS) firms have suffered a cyber-attack in the last 12 months, according to new research today from data security provider.
On-Demand Webinar
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
Press Release
Second Marriott Data Breach Affects 5.2M Guests
Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Press Release
Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach
Alyn Hockey, VP of Product Management at Clearswift, weighs in on the recent Marriott International data breach.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
Datasheet
Powertech Multi-Factor Authentication
Powertech Multi-Factor Authentication is a robust MFA solution for IBM i (AS/400, iSeries), it is a simple and effective way to ensure the users accessing your systems are who they say they are. Schedule a demo today.
Datasheet
Powertech Multi-Factor Authentication Compliance Datasheet
Comply with Security Standards, Including PCI DSS
The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Security
Do your users have ODBC connections to your IBM i environment through tools like Microsoft Access or Microsoft Excel?
Unprotected ODBC connections make it easy for people to access unauthorized data or accidentally change and delete database records.
Surveyor/400 minimizes the risk of unauthorized access by providing connections to your IBM i data while maintaining database security and inte...
Key Features
If you perform development for the IBM i, you will discover that Surveyor/400 provides a wide variety of benefits to make your job easier. Listed below is just a sample of some of the work you can easily perform using Surveyor/400:
Explore your IBM i through a drill-down tree interface similar to Windows Explorer
View extensive details on any object through an intuitive multi-tabbed panel
...