Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.
Press Release
HelpSystems (now Fortra) Fills Encryption Gap With Linoma Buy
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
Guide
Self-Audit: Checking Assumptions at the Door
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
Article
Robot Best Practices
By Tom Huntington on Mon, 06/27/2016
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article
Don’t Be Exposed In *PUBLIC!
Mon, 06/27/2016
Security typically operates so that users who are not granted authority have no authority. IBM i security, however, has a unique concept known as *PUBLIC.
Article
What's New for Security in IBM i 7.1
By Robin Tatam on Mon, 06/27/2016
IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Article
Is the i Ready for the Three Vs of Big Data?
By Tom Huntington on Mon, 06/27/2016
The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).
Article
Have You Met SAM?
By Chuck Losinski on Mon, 06/27/2016
Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.
Article
Interfaces with Robot Schedule
By Chuck Losinski on Mon, 06/27/2016
If you’re using EnterpriseOne or SAP, it may be to take a closer look at the security and business process automation that Robot Schedule can offer these key applications on IBM i. We don’t talk enough about the integration we’ve done between Robot Schedule and EnterpriseOne (formerly JD Edwards, now owned by Oracle) and SAP.
Case Study
Fortra Meets IT Security Needs for Napa Recycling and Waste Services
Napa Recycling and Waste Services (NRWS) provides recycling and waste collection to businesses and residents in the City of Napa and southern unincorporated Napa County. The entire county, with 90 percent of its agricultural land devoted to viticulture, is home to more than three hundred wineries in the Napa Valley, and is one of the top wine producing areas of the United States. In addition, the...
Case Study
Fortra Helps International Rectifier Tackle Critical SOX Issues
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
Case Study
Trident Seafoods Streamlines Business Processes with Robot Schedule
A large seafood manufacturer automates cross-platform job scheduling dependencies around Oracle JD Edwards EnterpriseOne. Hear how.