Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 21 of 540
Content types: Article X
Article
October 5, 2018

QA check oct 4

QA check oct 4

QA check oct 4

Article
September 25, 2018

Learn how one company benefitted from incorporating BoKS ServerControl, a PEDM solution, into their security portfolio.

PEDM case study

The article highlights the signs to look out for that it’s time to consider add another type of PAM solution—Privilege Elevation and Delegation Management (PEDM)—to help your organization as it continues to grow.

Password Vaulting

PASM and PEDM are two categories of security tools that have distinct approaches in how they manage access. Read on to find out the different approaches PASM and PEDM take to protecting your data, and how they can work together to maximize your security.

Different Paths, Same Goal: PASM and PEDM
Article
By on September 20, 2018

The EU’s General Data Protection Regulation (GDPR) has changed the way organisations around the world approach data security. Even if your centre of operations is nowhere near Europe, you must take stock of your IBM i security controls...

With cyberattacks still on the rise, you can never be too careful when it comes to securing your company’s data and the systems that house it. The problem is, without advanced endpoint protection it can be hard to discover the malware,...

Endpoint Antivirus Software

Why choose Powertech for your IBM i security needs? Here are the main reasons organizations around the world rely on us to protect their mission-critical systems.

Article
August 22, 2018

This article seeks to illustrate the contrast between stagnant security events at an organization without a SIEM, and the distinct life cycle of events when a SIEM is streamlining security threats.

There's no place for paper in today's AP processes. Find out how to save time and money with AP automation.

Accounts Payable automation produces ROI

This article takes a closer look at w hy granular access control is so effective -- by placing limitations on w ho can get into your organization’s system, w here, w hen and ho w they can access it, and w hat they can do with it.

Identity and Access Management

Still using OmniForm for creating fillable forms? You deserve a better option for complete business form correspondence.

move on to a web-based fillable forms solution

Despite popular opinion, IBM i is not bulletproof and cannot completely manage itself. But the operating system does make it easier for administrators.

S canning client PCs and doesn't mean a virus can't make it to your server. Effective malware defense requires multiple layers. This infographic highlights the four main reasons security experts give for using anti-virus software that runs natively on your Linux system.

hs-articles-4-Reasons-You-Need-Native-Linux-Virus-Scanning

What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.

Here are some reasons you can put forth to show your boss the value of investing in MSS.

Protect your data and your company from internal and external threats by ensuring that your security policies on-premise and in the cloud are aligned with this checklist.

In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem. After much soul searching over a few months the OSF Management Platform never arrived...
“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila...
Article
February 27, 2018

An introduction to Web Services, and how Automate helps you leverage that functionality.

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.

Article
By on February 23, 2018

When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.

Stay up to date on what matters.