Blog
Modern RMM Tools for MSPs
Wed, 08/24/2016
Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?
Article
Monitoring the Demands of Fast Disk
By Kurt Thomas on Wed, 08/24/2016
The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article
A Modern Approach to Performance Management
Wed, 08/24/2016
Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Article
Small but MIGHTY: Controlling the *CLS Object Type
By Kurt Thomas on Wed, 08/24/2016
While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Article
Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i
By Robin Tatam on Sun, 08/21/2016
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Checklists for Checklists on Checklists... Why Not Automate?
The topic of this white paper is specifically around the advantages of automating one of the last bastions of manual, hands-on management—the operation and maintenance of IT platforms, systems, networks and architectures.
Guide
6 Recommendations for Smarter Spooled File Processing on your IBM i
Learn how to improve the flow of essential information around your organization, save costs, and free up your time.
Guide
Managing Your IBM Enterprise with Halcyon
System administrators need more control and less complexity. This guide helps to identify the tools they need to be more effective at managing their enterprise.
Guide
IT Centralization and Robot
This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.
Guide
Building a Sound Investment Strategy Through Technology
Combining IBM Power Systems hardware and reliable iSeries job scheduler software is a powerful investment strategy for companies that not only improves their bottom line, but enhances customer experience.
Article
Improve Event Auditing Using the System Audit Journal
By Sandi Moore on Fri, 08/19/2016
With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Guide
Effective Log Management
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Two Factor Authentication for IBM i
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Article
Trigger Events with a File in Robot Schedule 12
By Tom Huntington on Fri, 08/19/2016
Robot Schedule version 12 makes monitoring for file events and setting them up as dependencies a very simple process.
Blog
User Interfaces: GUI vs. WUI
By Tom Huntington on Tue, 08/16/2016
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog
What’s New in IBM i 7.2?
By Tom Huntington on Tue, 08/16/2016
May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.