On-Demand Webinar
Simplify Processes with PowerShell RPA
By Pat Cameron
You don't have to manually schedule PowerShell scripts anymore. Watch the webinar to learn how you can easily automate critical PowerShell processes with RPA.
On-Demand Webinar
Bridge the Gap Between IT and Business: How to Engage the Business in Digital Transformation
Wed, 01/16/2019
An estimated 60 to 70 percent of initial robotic process automation (RPA) projects fail to meet expectations. Companies want to embrace the transformative technology, but with no sense of where to start and what processes to automate, their projects are dead on arrival.
Business and IT need to partner together to find strong initial candidates for automation that return...
On-Demand Webinar
How to Control Your Data and Stay Compliant with Robotic Process Automation
By Pat Cameron
Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable.
...
On-Demand Webinar
Why Your CRM System Needs RPA
By Pat Cameron
Watch our on-demand webinar to learn how you can use RPA to power your CRM system with the most up-to-date data from your critical business applications.
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In...
On-Demand Webinar
Everything You Need to Know About RPA in 30 Minutes
By Pat Cameron
If you’re hearing terms like digital workforce, software robot, and automation center of excellence, but aren’t sure what it all means, this webinar is for you. Learn about the advantages of automation with RPA, real-life robotic process automation use cases, and common RPA terminology.
On-Demand Webinar
Sync Your SharePoint Processes with Automation
Automation is a great way to streamline your SharePoint processes. Watch the webinar to learn how to keep these documents and information synced with the rest of your corporate data.
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
Blog
HR Automation Tips Part 1: Signs You Should be Automating
By Richard Schoen on Tue, 05/23/2017
Find out if it’s time to automate HR processes at your organization.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Powertech Helps Community Bank Enforce Internal iSeries Compliance
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study
Powertech Protects City Data and Vital Services with System i Security
The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study
Data Processing Incorporated Banks on the Power of Powertech
When faced with the banking industry’s complex security issues, Data Processing Incorporated turned to Powertech for flexible compliance solutions and first-rate support.
Case Study
Powertech Automated Solutions Help Bank of Stockton Improve Security and Compliance
Can a bank succeed without effective information security? Not in today’s world, where technology is such a vital part of every bank’s operations. And given legislative and regulatory actions that have forced widespread changes in the banking industry...
Case Study
Powertech Helps the Seneca Nation Play the Security Game
The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...