Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.
Guide
Self-Audit: Checking Assumptions at the Door
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
Blog
Say Goodbye to Document Mismanagement
Thu, 07/28/2016
We write a lot on this blog about document management, but this time we wanted to share a graphic illustrating the struggles that some companies and individuals still face in their processes.
Can you see yourself (or your company) in any of these stats? If so, let us help you find a solution!
With RJS, your company can digitize...
Article
Is the i Ready for the Three Vs of Big Data?
By Tom Huntington on Mon, 06/27/2016
The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).
Article
What's New for Security in IBM i 7.1
By Robin Tatam on Mon, 06/27/2016
IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Article
Don’t Be Exposed In *PUBLIC!
Mon, 06/27/2016
Security typically operates so that users who are not granted authority have no authority. IBM i security, however, has a unique concept known as *PUBLIC.
Article
Robot Best Practices
By Tom Huntington on Mon, 06/27/2016
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article
Have You Met SAM?
By Chuck Losinski on Mon, 06/27/2016
Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.
Article
Interfaces with Robot Schedule
By Chuck Losinski on Mon, 06/27/2016
If you’re using EnterpriseOne or SAP, it may be to take a closer look at the security and business process automation that Robot Schedule can offer these key applications on IBM i. We don’t talk enough about the integration we’ve done between Robot Schedule and EnterpriseOne (formerly JD Edwards, now owned by Oracle) and SAP.
Case Study
Fortra Meets IT Security Needs for Napa Recycling and Waste Services
Napa Recycling and Waste Services (NRWS) provides recycling and waste collection to businesses and residents in the City of Napa and southern unincorporated Napa County. The entire county, with 90 percent of its agricultural land devoted to viticulture, is home to more than three hundred wineries in the Napa Valley, and is one of the top wine producing areas of the United States. In addition, the...
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
Guide
Request a Live Advanced Reporting Suite Demonstration
See for yourself how Advanced Reporting Suite automates performance reporting for managed service providers (MSPs), making it easy to prove your value to customers. Our team of software experts would love to discuss what you’re looking for and show you what Advanced Reporting Suite can do.
Your live demo will include:
Discovery to help us identify your business needs
An overview of the...
Case Study
Trident Seafoods Streamlines Business Processes with Robot Schedule
A large seafood manufacturer automates cross-platform job scheduling dependencies around Oracle JD Edwards EnterpriseOne. Hear how.
Case Study
Policy Minder Helps Amway Remove the Guesswork from PCI Security Compliance
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.
Case Study
Halcyon Improves JD Edwards System Scalability and Manageability for ERP Suites
Halcyon delivers alerts about any issues that arise on IBM i-based systems and the JD Edwards processes running on it. This allows ERP Suites administrators to manage systems by exception, rather than having to monitor them continuously.
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Case Study
Halcyon Enables Business Growth by Increasing IT Productivity at Ahli United Bank
Ahli United Bank (AUB) is the largest publicly traded commercial lender in Bahrain. With a network of subsidiaries and associated companies, it provides a range of award-winning retail, private and corporate banking, treasury, investment, and wealth management services.
Case Study
Halcyon Helps IBM i Support at Tyco Electronics Stay Connected to Their System
For the Australian and New Zealand arm of Tyco Electronics, the reliability of its IBM i-based ERP software is fundamental to business efficiency. The challenge, though, is for a relatively lean IBM i support team to provide around-the-clock support to ensure 24-hour uptime.