Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.
CEO Chris Heim took over one of the Twin Cities’ largest software and IT-services firms in 2014. Before joining HelpSystems, Heim was CEO of Axium Software, a Portland, Ore.-based software company that was sold to Deltek in 2014. From 2007 to...
The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion!
The GDPR takes effect on May 25, 2018 . Organizations...
HGGC becomes leading investor in HelpSystems to support strong global growth across cybersecurity, automation, and business intelligence solutions
HelpSystems, the fast-growing Eden Prairie-based software and IT services firm, has a new majority owner. HGGC, a Silicon Valley private equity firm, is leading a recapitalization, less than three years after HelpSystems was acquired by a new...
HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down...
Protect your data and your company from internal and external threats by ensuring that your security policies on-premise and in the cloud are aligned with this checklist.
Today many organizations around the world use IBM’s AIX® – an open, standards-based operating system (OS) that is UNIX-compliant. Running on IBM Power servers, AIX supports many critical applications. But what is AIX usage like among IT professionals? What are they doing to secure it? And what are their plans for it? This report answers these key questions, provides insights, and helps paint a picture of the changing AIX landscape.
This report is based on a survey of AIX IT experts from a variety of organizations around the world in different industries and of different sizes. The survey was conducted in 2018.
Auditors and internal policy controls often require the review of numerous security details and configuration metrics—a time-consuming and resource-intensive process. IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
In fourth annual survey, more than 650 IT professionals around the world rate security, high availability, and modernization as top considerations for 2018.
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
By December 31, federal agencies and contractors must comply with the NIST 800-171 Cybersecurity standards. Find out what those requirements mean and how to comply.
This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.
The explosion of technology-centric breaches has helped elevate security and compliance to a leading IT initiative. Here’s your chance to catch up with HelpSystems and learn about new ways we can help you and your company meet today’s cybersecurity challenges.
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes...
Get Carol Woodbury's expert tips for using the integrated IBM i audit journal.
The PCI Council has issued several updates to the Payment Card Industry’s Data Security Standard (PCI DSS). Carol Woodbury discusses what they mean for IBM i.
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
There's one IT trend you can’t ignore: government is increasingly regulating organizations’ cybersecurity preparedness. Learn how to navigate the latest cybersecurity law and how it applies to IBM i.
New York's law applies to more organizations than you might expect. This guide is designed to explain what the law means for IT professionals everywhere and how it is likely to influence future privacy regulations.
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.