Resources

Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled. Download this guide for...
Case Study

Automate Streamlines Lottery Operations and Reporting in Louisiana

Louisiana Lottery Corporation was created in 1991 by the Louisiana state legislature with the idea of generating revenue without increasing taxes. Its mission is to organize, manage, and oversee the operations which support the Louisiana Lottery. Responsibilities entail all collections, accounting, auditing, reporting, and support for the thousands of retailers who sell lottery tickets for games...
Case Study

Robotic Process Automation Case Study: Automate Integrates Critical Applications for a Major Medical Center

The University of Texas MD Anderson Cancer Center has the challenge of staffing and managing thousands of nurses busy delivering top-notch patient care. To manage this complexity, MD Anderson relies on three critical applications: a human resource system by PeopleSoft, a time and attendance system by Kronos, and a staffing system by Per-Se's ANSOS One-Staff. These three applications (with their...
Case Study

Automate Saves Vestcom 200 Hours per Week with GUI Automation

Getting sophisticated signage to the store shelf requires a lot of digital heavy lifting. At Vestcom International, raw product data sent by major retailers and brand manufacturers must be scrubbed, organized, converted to PostScript files, and sorted by variables such as tag type and store location before being transmitted to 10 company production facilities around the country for printing and...
Case Study

Automate Eliminates SYSPRO Night Duty for Lab Products Manufacturer

The IT team at World Precision Instruments (WPI) wanted to take back the night on behalf of employees responsible for running reports from the company's SYSPRO ERP system. Instead of requiring employees to manually trigger and generate reports from home at specific hours in a specific sequence on a nightly basis, the company wanted to automate the entire process without investing in custom...
Case Study

Financial Group Streamlines Loan Origination with Robotic Process Automation

Aldergrove Financial Group is a community-based credit union in Frazier Valley, British Columbia that provides personal and business banking solutions to its 20,000 members. Formed in 1954 under the original name of Otter Farmers’ Institute Credit Union, Aldergrove has since merged with the Matsqui Credit Union and expanded to five branches. Aldergrove is committed to providing personal...
Case Study

Automating Crystal Reports with Automate Saves 20 Hours per Week for Appliance Distributor

For wholesale appliance distributor Echelon Home Products, generating and distributing reports for four different business divisions used to require at least 20 hours of weekly Crystal Reports work as well as wreak havoc among employees every Monday because of an all-day report-related network slowdown. That changed in 2008 when Echelon plugged into Automate , the robotic process automation ( RPA...
Case Study

Pacific Toxicology Laboratories Saves Time with Automate

Pacific Toxicology Laboratories (PacTox), located in Chatsworth, California, is a privately owned company that performs five distinct lab functions under one roof—drug testing, biological monitoring, medical surveillance, therapeutic drug monitoring, and forensic toxicology. PacTox's competitive advantage is its unique ability to provide integrated biological testing services. Clients include...
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

The DDoS Deception You Need to Know About

A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog

What is the Value of SIEM?

As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.