Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 21 of 91
Content types: Article, Guide, Live Webinar, News, On-Demand Webinar X Solutions: Compliance & Audit Reporting X
Guide
March 5, 2019

With so many organizations depending on AIX day to day, data on its usage is of great importance to technology experts, particularly in the areas of security, long term roadmaps, and new regulatory requirements.

This survey was conducted in Q4 2018 to gauge how AIX is being used and the role it will play for IT leaders in the coming years. 600 IT professionals from various industries around the world participated.

Guide
By on February 15, 2019

To protect against that risk—and the chance of failing a PCI or SOX audit—you need to ensure privileged users can't abuse their access. This exclusive guide shows you how.

Available On Demand

Get Carol Woodbury's expert tips for using the integrated IBM i audit journal.

News
June 16, 2018

CEO Chris Heim took over one of the Twin Cities’ largest software and IT-services firms in 2014. Before joining HelpSystems, Heim was CEO of Axium Software, a Portland, Ore.-based software company that was sold to Deltek in 2014. From 2007 to...

Available On Demand

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion!

The GDPR takes effect on May 25, 2018 . Organizations...

News
April 10, 2018

HGGC becomes leading investor in HelpSystems to support strong global growth across cybersecurity, automation, and business intelligence solutions

News
April 4, 2018

HelpSystems, the fast-growing Eden Prairie-based software and IT services firm, has a new majority owner. HGGC, a Silicon Valley private equity firm, is leading a recapitalization, less than three years after HelpSystems was acquired by a new...

News
June 14, 2018

HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down...

Protect your data and your company from internal and external threats by ensuring that your security policies on-premise and in the cloud are aligned with this checklist.

Guide
March 6, 2018

Today many organizations around the world use IBM’s AIX® – an open, standards-based operating system (OS) that is UNIX-compliant. Running on IBM Power servers, AIX supports many critical applications. But what is AIX usage like among IT professionals? What are they doing to secure it? And what are their plans for it? This report answers these key questions, provides insights, and helps paint a picture of the changing AIX landscape.

This report is based on a survey of AIX IT experts from a variety of organizations around the world in different industries and of different sizes. The survey was conducted in 2018.

Available On Demand

Auditors and internal policy controls often require the review of numerous security details and configuration metrics—a time-consuming and resource-intensive process. IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?

News
January 15, 2018

In fourth annual survey, more than 650 IT professionals around the world rate security, high availability, and modernization as top considerations for 2018.

Available On Demand

Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.

Available On Demand

By December 31, federal agencies and contractors must comply with the NIST 800-171 Cybersecurity standards. Find out what those requirements mean and how to comply.

Guide
August 31, 2017

This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.

Available On Demand

The explosion of technology-centric breaches has helped elevate security and compliance to a leading IT initiative. Here’s your chance to catch up with HelpSystems and learn about new ways we can help you and your company meet today’s cybersecurity challenges.

Available On Demand

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes...

Available On Demand

The PCI Council has issued several updates to the Payment Card Industry’s Data Security Standard (PCI DSS). Carol Woodbury discusses what they mean for IBM i.

Available On Demand

Watch this webinar to learn how you can get more out of your queries with a modern data access tool.

Available On Demand

There's one IT trend you can’t ignore: government is increasingly regulating organizations’ cybersecurity preparedness. Learn how to navigate the latest cybersecurity law and how it applies to IBM i.

Guide
By on April 27, 2017

New York's law applies to more organizations than you might expect. This guide is designed to explain what the law means for IT professionals everywhere and how it is likely to influence future privacy regulations.

Stay up to date on what matters.