Resources

Guide

Download "IBM i User Provisioning"

Even when user profiles are painstakingly set up, keeping them consistent and secure can be an uphill battle. All it takes is one over-privileged user and your most critical data could be changed, deleted, or worse. You need help—not only to set up new users with discretion, but also to keep them consistent across roles, departments, and systems. Our exclusive white paper includes expert advice...
Guide

Top Security Issue for the Integrated File System (IFS)

The IFS is one of the most ignored parts of the system, yet it enables many of the most powerful and most used features on IBM i today. Overlooking the ways in which IBM i utilizes the IFS could weaken your security.
Guide

Managing Data and Healthcare Regulations Efficiently

The right Business Intelligence (BI) tool can address the twin challenges of today's healthcare industry and regulations: efficient, secure information retrieval and effective monitoring of day-to-day operations. In February 2009, President Barack Obama signed the American Recovery and Reinvestment Act (ARRA). Title XIII of ARRA, called the Health Information Technology for Economic and Clinical...
Press Release

Fortra Acquires Safestone Technologies Ltd.

Safestone Technologies is the 3rd acquisition for Fortra this year. Safestone Technologies’ experience in security, auditing, and compliance solutions complements the mission of PowerTech, a division of Fortra.
Article

Automate the Un-Automatable

Automated job scheduling means your batch jobs run smoothly and your stress level goes down, but that’s only half the battle if you’re using labor-intensive, interactive applications that require you to fill out screens to submit a job.
Article

4 Reasons to Add VTLs

Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Article

Increase Productivity with Sequel View Builder

Business success hinges on sharing relevant information with the people who need it. When members of your organization can make informed decisions, productivity increases and problems can be solved more creatively. With Sequel Data Access, more business users within your organization can see these benefits on an even greater scale. Not using Sequel yet? Learn more > Using Sequel? Keep...
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

IT Centralization and Robot

This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.