Datasheet
Sequel Web Interface
Make real-time business decisions, wherever you are, with Sequel Web Interface.
Blog
Why Should I Automate My IBM i?
By Tom Huntington on Thu, 09/10/2020
Automation means more than efficiency, accuracy, and ROI. It has a real impact on the people who love and work with the platform every day, as well as those who will fill their shoes in days to come.
Article
Hinder Jobs to Make Life More Productive for Users
By Kurt Thomas on Mon, 09/07/2020
Control the run priority of a job based on its job CPU usage, so your IBM i has the right jobs consuming the right resources. Learn how here.
Datasheet
VCM Enterprise
VCM Enterprise allows you to get insight into your hybrid IT infrastructure, plan accurately for future needs, and prevent problems before they occur.
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Blog
Top 3 IT Strategies for Optimizing Productivity
By Brian Pick on Tue, 08/18/2020
IT professionals today encounter more challenges than just convincing upper management to increase the budget. Read on to learn how your peers overcome everyday obstacles in the workplace and optimize their productivity – even as new fires pop up around them.
Article
IBM i Cloud Security Considerations
Fri, 08/14/2020
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar
How to Upgrade to IBM i 7.4
It’s more work to plan an upgrade than to make the upgrade itself. Darren Anderson and IBM Champion Tom Huntington help you discover what you need to upgrade to IBM i 7.4.
Blog
User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate
By Brian Pick on Tue, 08/04/2020
File sharing and secure collaboration tools are all the rage. Watch out for the security concerns and risks that go along with them.
Blog
How Encryption Works: Everything You Need to Know
By Brian Pick on Mon, 07/27/2020
Encrypting files helps defend against cybersecurity threats. Learn more about how it works and what method, combined with GoAnywhere MFT, is recommended depending on your specific needs.
On-Demand Webinar
Ask the Experts: Power Hardware Upgrades
By Randy Watson
This webinar is a unique, online opportunity to hear how you can make smart technology decisions around your next Power hardware upgrade.
On-Demand Webinar
How to Do IT Cost Optimization
By Per Bauer
30% of hybrid IT spend is wasted. Whether you find that number shocking or not, you likely don’t know how to identify and eliminate the wasted spend while assuring performance.
Many organizations have adopted a “performance at any cost” mindset to ensure service delivery and choose to overprovision IT resources for peace of mind. But the cost of overprovisioning adds up and quickly becomes...
On-Demand Webinar
IBM i Solution Edition Program Explained
When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
Blog
What is the California Consumer Privacy Act?
By Brian Pick on Wed, 07/08/2020
Are you prepared for the California Consumer Privacy Act? Read more about what it is, and who it impacts.
Guide
How to Do IT Cost Optimization
Our years of experience shows that organizations waste 30% of their hybrid IT spend, on average. This article identifies the five key components of a cost optimization strategy and how to be successful with each of them.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
On-Demand Webinar
Remote Management for IBM i Backups
Watch this recorded webinar to learn the tools and techniques you need to set up remote management for unattended IBM i (iSeries, AS/400) backups.
Blog
Key Cybersecurity Takeaways from the EasyJet Data Breach
By Brian Pick on Fri, 06/05/2020
One of the latest data security breach examples is EasyJet, which revealed that nine million customers’ personal data was compromised. Learn more about data breaches in the age of COVID-19, and what steps you can take to protect your organization.