Resources

Article

A Modern Approach to Performance Management

Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog

The 9 Server Sprawl Questions You Need to Ask

For budding companies, server sprawl may be just one of many growing pains—a temporary inconvenience for a greater good. But if you’re struggling to complete processes on time, stalling with the auditors, and jumping from server to server whenever an error occurs, it’s time to ask the tough questions.
Blog

The #1 Step Before Automation

An up-to-date and comprehensive runbook won't win you any awards. But when you get the green light to implement a workload automation tool, documentation is your lifeline. Unfortunately, most runbooks aren’t up to snuff.
Case Study

Powertech Helps Community Bank Enforce Internal iSeries Compliance

First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study

Powertech Protects City Data and Vital Services with System i Security

The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study

Powertech Helps the Seneca Nation Play the Security Game

The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...
Case Study

Service Corp Company Benefits From Automation

"Automate Schedule's audit log is crucial to us because one of our SOX controls is to validate that we keep schedule logs for a certain period of time. An audit log is critical for a scheduler."