Generating Reports Around User Profiles
Convert user profile data into compliance reports that satisfy SOX, PCI, or MICS auditors with Compliance Center. Watch our short video to learn how to build a query and view the results. Brand...
View ArticleReport Generation Across Multiple Systems
Compliance Center allows you to group systems by any criteria you choose and generate reports across the entire group. Watch our short video to see how you can create groups, run a query on multiple...
View ArticleScheduling Reports
With Compliance Center, you can run and distribute reports automatically. Watch our short video to learn how to create and edit a schedule, define email parameters, and distribute a report in PDF...
View ArticleSaving System Configurations Offline
Networking machines is an important function if you have multiple systems or multiple LPARs. Watch our short video to see how to copy configuration details onto multiple systems. Brand Safestone...
View ArticleEvolution and You: Maintaining Compliance with PCI 3.0's Changing Security...
Brand PowerTech PCI DSS 3.0 adds new requirements for all organizations subject to cardholder security compliance. It includes new requirements for vulnerability assessments, tighter password...
View ArticlePowerTech's IBM i Security Study Featured in IT Jungle
IT Jungle's article, "IBM i Security Assessment: How About Now?" features PowerTech's annual IBM i Security Study and states that organizations can no longer claim ignorance when it comes to the IBM i...
View Article2015 State of IBM i Security Study
System administrators and IT managers rely on Power SystemsTM servers running IBM i because of their well-deserved reputation for impenetrable security. But the data from the 2015 State of IBM i...
View ArticlePowerTech Protects Healthcare Company’s IBM i Systems to the Max
All organizations must protect their data and systems, but some industries face greater security pressures than others.As a member of the healthcare industry, a pharmacy benefit management company...
View ArticleTips for Preparing for an IBM i Security Audit
Many administrators experience what I call the "audit fire drill" when they hear they're about to undergo an audit. My desire is to help eliminate some of the panic when preparing for an audit by...
View ArticleHelpSystems Provides Penetration Testing for IBM i
Security experts help organizations meet new Payment Card Industry requirements by simulating attacksMinneapolis, MN, October 27, 2015—HelpSystems, a leading provider of systems management, business...
View ArticlePolicy Minder
Spend less time managing scripts, administering security, and developing compliance reports.Policy Minder makes your life easier by automating security administration and compliance reporting, and...
View ArticlePolicy Minder Helps CDW Automate Regulatory Compliance Requirements
CDW is a leading provider of technology solutions for business, government, education and healthcare. Founded in 1984, CDW features dedicated account managers who help customers choose the right...
View ArticlePolicy Minder Helps Amway Remove the Guesswork from PCI Security Compliance
Amway is a privately held business with locations in 80 countries. As a global leader in the health and beauty field, the company offers opportunities that help people develop businesses of their own...
View ArticlePolicy Minder for IBM i
Policy Minder makes your life easier by automating security administration and compliance reporting on the IBM i platform from an easy-to-use, web-based interface.Start by defining your policies for...
View Article10 Tips for AIX Security
Used a well-defined security policy to protect your systemServers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From...
View ArticleAn Introduction to PCI Compliance
“From the world's largest corporations to small Internet stores, compliance with the PCI Data Security Standard (PCI DSS) is vital for all merchants who accept credit cards, online or offline, because...
View Article