-
Alan Jordan |
Greg J. Schmidt
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Blog
Top Five Business Efficiency Goals You Can Achieve with a Document Management Solution (DMS)
By Greg J. Schmidt on Fri, 01/26/2024
Document Management Solutions (DMS) impact productivity and efficiency at nearly every level of modern business. Discover the top five business efficiency goals you can achieve with a DMS and how you can get started.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
The Benefits of Automating IBM i Spool File Conversion and Delivery
By Greg J. Schmidt on Wed, 06/14/2023
Discover how automating your IBM i spool file management and delivery can make your data more accessible to users and easier to deliver for administrators.
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Ask the Data Warehouse Experts
By Alan Jordan
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.
Datasheet
Powertech Database Monitor for IBM i
Powertech Database Monitor for IBM i leverages IBM i to automate, streamline, and centralize your database monitoring while providing full notification, authorization, reporting, and regulatory compliance capabilities. Schedule a demo today.
Blog
How to Automate Security Policy Enforcement
By Robin Tatam on Wed, 10/18/2017
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Blog
Banking on Value: Why Banks Are Turning to Data Warehouses for Insight
By Alan Jordan on Tue, 05/09/2017
Find out why so many banks are turning to data warehouses for trustworthy analytics and actionable insight.
On-Demand Webinar
Report Capture and Delivery for the 21st Century
It’s time to re-think your reports. Watch the webinar to learn how to modernize report capture, management, and delivery for Windows and IBM i.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?