On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
Quote
Request a GoAnywhere MFT Quote
GoAnywhere MFT is an award-winning managed file transfer solution that helps streamline the exchange of data between users, systems, applications, and on-premises or cloud environments. Simply fill out the form to get started....
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By Robin Tatam on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
Authentication Manager
Compliance and cybersecurity are challenges facing virtually every organization. But meeting these challenges often drains IT resources, cutting into other critical projects. Powertech Multi-Factor Authentication features an authentication manager that enables IT staff—and end users—to work efficiently.
From user administration to auditing and reporting, this authentication manager delivers the...
Authentication Methods
Organizations around the world have a common problem: when security controls are too burdensome, users look for ways to get around them and compromise sensitive data in the process.
Powertech Multi-Factor Authentication is a multi-factor solution that eliminates this problem. By providing several different authentication methods to choose from, Powertech Multi-Factor Authentication ensures that...
Powertech Multi-Factor Authentication
Simple access authentication for servers inside and outside your firewall
On-Demand Webinar
An Automated Recovery Plan Auditors Will Love
Boom. Disaster strikes. Now, it’s up to you to find the tape volume that contains the lost data and restore it quickly to the correct location. Luckily, recovering your IBM i data is easy with Robot Save.
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
On-Demand Webinar
VTL Save Strategies on IBM i
By Rick Koenig
Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
On-Demand Webinar
Automate IFS Backups and Restores
Automating IBM i backups just got easier. See how Robot Save data backup management software for IBM i can help.
On-Demand Webinar
Introduction to FlashCopy
By Chuck Stupca
Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.
On-Demand Webinar
Never Worry About a Late Backup Again!
Data security and storage expert Glenn Haley joins us to discuss how VTL helps you.
Article
4 Reasons to Add VTLs
By Tom Huntington on Tue, 08/30/2016
Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Blog
What’s Really Faster: VTL or LTO?
By Tom Huntington on Tue, 08/16/2016
VTL can be faster than LTO if you take advantage of the virtual features, but if your backup rules stay the same, you may be disappointed. Read on.