DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Thanks to Sequel Data Warehouse, shops using both Windows and IBM i can move their essential data storage and reporting back to the more reliable IBM i. See how here.
Got questions about moving beyond SQL to Sequel Data Access? Get answers, and get the business intelligence your organization needs from your IBM i data.
It can be a challendge to bring information together from across disparate sources, especially when the data is stored in different formats or with mismatched identifiers. You're likely to encounter issues that a reporting tool by itself simply cannot solve. Read on to learn why you should consider a data warehouse vs. just a database.
In this on-demand webinar, Robin Tatam discusses a documented AS/400 breach, as well as the steps you can take to avoid a similar incident at your own organization.
When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!
IBM i has never been immune to malware—but threats to businesses are greater than ever. Watch this webinar to learn how to keep your systems up and running.
In 1986, IBM launched AIX®, its open standards-based UNIX operating system. Now, more than 30 years later, this popular platform runs on IBM POWER® servers and supports critical applications for organizations around the world. With such a strong presence in IT environments, AIX and its specific usage is of great interest to IT experts as they evaluate their own technology ecosystems in light of...
During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.