Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
With so many organizations depending on AIX day to day, data on its usage is of great importance to technology experts, particularly in the areas of security, long term roadmaps, and new regulatory requirements.
In Q4 2019, 200 IT professionals across more than 11 industries in North America, EMEA, Latin America, and the APAC region participated in the AIX Community Survey. Results, data, and insights from this survey will be discussed in this report.
To protect against the risk of a data breach—and the chance of failing a PCI or SOX audit—you need to ensure privileged users can't abuse their access. This exclusive guide shows you how.
This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.
New York's law applies to more organizations than you might expect. This guide is designed to explain what the law means for IT professionals everywhere and how it is likely to influence future privacy regulations.
Protecting sensitive corporate information and meeting compliance requirements aren’t the only reasons your organization needs a security policy. A well-defined policy can make the difference between maintaining the trust of customers, vendors, and employees—or facing the damaging consequences of a data breach.
Meeting government and industry compliance requirements is one of the top challenges faced by IT professionals. This guide is designed to help you make sense of the Health Insurance Portability and Accountability Act (HIPAA), which is one of today’s most common compliance mandates.
The goal of SOX is to hold companies accountable for corporate financial reporting and governance, and IT's involvement is vital. This guide is designed to help you make sense of Sarbanes-Oxley (SOX).
Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to adequately secure critical data stored in IT systems .
Organizations around the world are implementing a...
This white paper examines how the Payment Card Industry Data Security Standard (PCI DSS) relates to IBM i servers and highlights when the Powertech products can provide a solution to specific PCI requirements.
It's a good idea to give your systems a thorough self-audit, but knowing what to check and how to be as sure as possible that things are okay can be a moving target.
In this ebook, you’ll get a jumpstart and walk through some of the checks to go through to self-audit a Linux server’s security.
When 65 percent of the cost of a data breach is due to lost business, securing systems and meeting compliance requirements are vital initiatives for organizations of any size. This paper provides an overview of auditing an IBM Power Systems™ server running IBM i, using Powertech Security Scan.