Resources

Blog

Cracking the Problem of Endpoint Security

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that distract from other critical projects? We...
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Guide

The Ultimate Buyer’s Guide for Network Monitoring Software

What critical features should a network monitoring solution give me? How do software licensing models compare? What do trends like hybrid IT, the Internet of Things, and IT automation have to do with network monitoring? Answer all of your questions with the help of a seasoned technology expert. In this informative, easy-to-read guide, network professional Kevin Jackson covers everything from...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...
Case Study

For Centralized Data Processing, KeHE Relies on Fortra

As the nation’s leading distributor of natural, organic, specialty, ethnic, and gourmet food products, KeHE Distributors has helped thousands of retailers—from the smallest independent stores to the largest supermarket chains—meet the constantly growing demand for products that help people to live well. John Kinnaird is the National Operating Center Manager responsible for supporting both hardware...
Case Study

Lamps Plus Reduces Overtime Using Automation Solutions from Fortra

Established in 1976, Lamps Plus has brought excellence to the retail lighting industry for more than 35 years. Today, they are the nation’s largest specialty lighting company with more than 40 superstores throughout the western United States. They serve over five million customers a year with functional and decorative lighting products, in-home lighting consultations, in-store lighting seminars...
Case Study

Bank of Stockton Turns to Fortra for Reliable, Error-Free Operations

Founded in 1867, Bank of Stockton has always been at the forefront of banking technology innovation. With 17 branches in five counties across central California, Bank of Stockton is known as a community bank with a reputation for continually investing in new technology-based products and services to better serve its customers. Whether working to attract and retain customers, protect privacy, or...
Case Study

Fortra Helps Tara Materials Focus on Canvas, Not Paper

Canvas is the foundation of many great works of art. For many years, Tara Materials has been a major supplier of canvas. Its leading product line, Fredrix, was first manufactured in 1868. Today, Tara has two factories in Tijuana, California and Lawrenceville, Georgia that assemble more than three million pieces of stretched canvas and make about half a million yards of coated canvas each year.
Case Study

Cashman Equipment Looks to Fortra Professional Services with High Hopes

Cashman Equipment Company is not only one of the highest-rated Caterpillar equipment dealers in North America, but it is also one of the largest privately-owned companies in Nevada. Headquartered in Henderson, they employ over 600 dedicated team members of various professional and technical backgrounds. Nationally recognized by Caterpillar for outstanding sales performance, Cashman Equipment is a...
Case Study

AAA Life Leverages Fortra Solutions for IT Efficiency

Part of the American Automobile Association (AAA) family, AAA Life Insurance Company offers a variety of competitive life insurance, annuity, and travel accident products. With over one million policies, many people rely on AAA Life to help provide protection for their loved ones. As Senior Systems Engineer at AAA Life, Randy Wittner is in charge of their IBM i environment, overseeing two S824...
Case Study

Powertech Helps Community Bank Enforce Internal iSeries Compliance

First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...