On-Demand Webinar
How to Use BI for Better Invoicing on IBM i
When Meissner Mfg. needed a better way to streamline their accounts receivable, they turned to Sequel and have been thrilled with its impact. Join this webinar to hear our conversation with Meissner Mfg. on how they saved 100+ hours a month with better business intelligence on IBM i with Sequel.
Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
On-Demand Webinar
IBM i Data: A Picture Is Worth 1,000 Words
As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs).
Decision-makers need to visualize the data before...
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.
On-Demand Webinar
Accelerating Programmer Productivity with Sequel
Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
Watch the recorded webinar to see how Sequel:
Makes creating complex results simple
Eliminates barriers to data sources
Increases...
On-Demand Webinar
PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons
Tue, 07/16/2019
Explore the changes in the way systems are deployed, and get a current view of Privileged Access Management in a world without passwords.
On-Demand Webinar
What’s the IBM i Community Saying About Business Intelligence?
Hear how the IBM i community achieve their business intelligence goals.
On-Demand Webinar
IBM i Data Access in Less Than 60 Minutes
Accessing, analyzing, and reporting on your IBM i and remote databases like Excel can be quicker or easier than with Sequel.
Blog
Multinational Healthcare Organization Implements Fast, Easy, and Secure Data Reporting
Wed, 05/15/2019
Making data accessible and ensuring data privacy are essential in today’s healthcare market.
One multinational healthcare organization faced inefficient processes that slowed them down. Employees around the organization were left waiting for reports with vital information like admissions, discharges, bills, and collections.
So, they turned to Sequel Data...
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
On-Demand Webinar
Spring your IBM i Data into Excel with Sequel
Accessing, analyzing, and reporting on your IBM i and remote databases like Excel can be easy with Sequel.
Blog
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
Fri, 03/22/2019
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
Product Video
Watch a Demo of Core Privileged Access Manager (BoKS)
Transform your server environment into one streamlined managed security domain.
Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...
Blog
Three Signs You've Outgrown Your Password Vault
Mon, 01/28/2019
Watch the vlog to find out the signs to look out for when it’s time to consider adding another type of PAM solution to help your organization as it continues to grow.
On-Demand Webinar
How to Access Meaningful Information with Data Visualization
It's not news that everyone needs accurate business data these days—and they needed it 5 minutes ago. Real-time, actionable information needs to be simple to access and shouldn't require IT to translate it into something a business user will understand.
In this webinar you'll see:
How Sequel makes your KPIs accessible in powerful dashboards
How many ways users can analyze their data in client...
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.