Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 21 of 90
Content types: Article, Guide, Live Webinar, News, On-Demand Webinar X Solutions: Compliance & Audit Reporting X
News
June 16, 2018

CEO Chris Heim took over one of the Twin Cities’ largest software and IT-services firms in 2014. Before joining HelpSystems, Heim was CEO of Axium Software, a Portland, Ore.-based software company that was sold to Deltek in 2014. From 2007 to...

Available On Demand

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion!

The GDPR takes effect on May 25, 2018 . Organizations...

News
April 10, 2018

HGGC becomes leading investor in HelpSystems to support strong global growth across cybersecurity, automation, and business intelligence solutions

News
April 4, 2018

HelpSystems, the fast-growing Eden Prairie-based software and IT services firm, has a new majority owner. HGGC, a Silicon Valley private equity firm, is leading a recapitalization, less than three years after HelpSystems was acquired by a new...

News
June 14, 2018

HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down...

Protect your data and your company from internal and external threats by ensuring that your security policies on-premise and in the cloud are aligned with this checklist.

Guide
March 6, 2018

Today many organizations around the world use IBM’s AIX® – an open, standards-based operating system (OS) that is UNIX-compliant. Running on IBM Power servers, AIX supports many critical applications. But what is AIX usage like among IT professionals? What are they doing to secure it? And what are their plans for it? This report answers these key questions, provides insights, and helps paint a picture of the changing AIX landscape.

This report is based on a survey of AIX IT experts from a variety of organizations around the world in different industries and of different sizes. The survey was conducted in 2018.

Available On Demand

Auditors and internal policy controls often require the review of numerous security details and configuration metrics—a time-consuming and resource-intensive process. IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?

News
January 15, 2018

In fourth annual survey, more than 650 IT professionals around the world rate security, high availability, and modernization as top considerations for 2018.

Available On Demand

Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.

Available On Demand

By December 31, federal agencies and contractors must comply with the NIST 800-171 Cybersecurity standards. Find out what those requirements mean and how to comply.

Guide
August 31, 2017

This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.

Available On Demand

The explosion of technology-centric breaches has helped elevate security and compliance to a leading IT initiative. Here’s your chance to catch up with HelpSystems and learn about new ways we can help you and your company meet today’s cybersecurity challenges.

Available On Demand

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes...

Available On Demand

Get Carol Woodbury's expert tips for using the integrated IBM i audit journal.

Available On Demand

The PCI Council has issued several updates to the Payment Card Industry’s Data Security Standard (PCI DSS). Carol Woodbury discusses what they mean for IBM i.

Available On Demand

Watch this webinar to learn how you can get more out of your queries with a modern data access tool.

Available On Demand

There's one IT trend you can’t ignore: government is increasingly regulating organizations’ cybersecurity preparedness. Learn how to navigate the latest cybersecurity law and how it applies to IBM i.

Guide
By on April 27, 2017

New York's law applies to more organizations than you might expect. This guide is designed to explain what the law means for IT professionals everywhere and how it is likely to influence future privacy regulations.

PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?

Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.

Stay up to date on what matters.