PowerTech Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
PowerTech

Overview: PowerTech, the leader in security solutions for Power Systems running IBM i, helps users manage today’s complex compliance regulations and data privacy threats. Companies worldwide rely on PowerTech security solutions to protect their critical data.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by PowerTech.
Research offered by PowerTech

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech. July 2008 - This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.

  View Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) research abstract

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400) by PowerTech. November 01, 2007 - Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...

  View Best Practices in Audit and Compliance Reporting for IBM System i (AS/400) research abstract

Configuring and Using IBM i's Auditing Functions by PowerTech. March 03, 2010 - Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.

  View Configuring and Using IBM i's Auditing Functions research abstract

IBM Eye: Security Detective for Hire by PowerTech. September 25, 2009 - This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.

  View IBM Eye: Security Detective for Hire research abstract

PCI Compliance for IBM System i (AS/400) by PowerTech. November 2007 - This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.

  View PCI Compliance for IBM System i (AS/400) research abstract

PowerTech Easy Pass Saves Chisago County Time and Valuable Resources by PowerTech. October 02, 2006 - Chisago County needed a preventative measure to increase their level of AS/400 security and to eliminate the need for users to write down their passwords which posed a real security threat. They also needed a low maintenance solution. Enter PowerTech.

  View PowerTech Easy Pass Saves Chisago County Time and Valuable Resources research abstract

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech. April 06, 2010 - Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.

  View Presentation Transcript: Configuring and Using IBM i's Auditing Functions research abstract

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command by PowerTech. October 16, 2009 - When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.

  View Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command research abstract

The State of System i Security 2007 by PowerTech. April 01, 2007 - This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400.

  View The State of System i Security 2007 research abstract

The State of System i Security 2008 by PowerTech. August 2008 - This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.

  View The State of System i Security 2008 research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts