Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog
Who's Afraid of IASPs?
By Tom Huntington on Tue, 08/16/2016
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
Robot and FlashCopy
By Tom Huntington on Tue, 08/16/2016
Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Guide
Self-Audit: Checking Assumptions at the Door
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
Article
Is the i Ready for the Three Vs of Big Data?
By Tom Huntington on Mon, 06/27/2016
The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).
Article
Robot Best Practices
By Tom Huntington on Mon, 06/27/2016
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
cta_page
Start the Conversation
A consultation starts the conversation about what your document and forms processes look like today and how they could change. You may know change is needed but not know what change will be most effective. That’s where we can help.
What Will Happen in My Consultation?
You'll talk about how you're managing your documents and forms today and what bottlenecks or roadblocks you encounter in your...
Demo
See AP Automation in Action
Let us show you how Webdocs for AP uses advanced capture processing and intelligent document classification to simplify invoice management with quick, easy import, indexing, and routing. We’re the experts in understanding your invoice scanning processes. All our demonstrations begin with a discussion around your current workflows, followed by a demonstration of how our software can help you...
Webdocs for AP
AP automation for PO and non-PO based invoice management
Powertech Compliance Monitor for IBM i
Consolidated compliance monitoring and reporting across Power servers
Robot Space
Hands-free disk space analysis and monitoring
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Hi-Temp Insulation, Inc. Accelerates Order-to-Ship Processes (and More) for Fast ROI with Fortra
28,000+ hours: that's how much time Hi-Temp saves annually by automating order-to-ship processes (and more) with Fortra.
Case Study
Empire Merchants Saves Big with Paperless Invoice Processing
Processing and distributing invoices is a breeze, now that Empire Merchants has Webdocs for AP.
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Automated Solutions Help Bank of Stockton Improve Security and Compliance
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...
Case Study
Powertech Helps the Seneca Nation Play the Security Game
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...