Resources

Blog

How to Succeed at IBM i Security

Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
On-Demand Webinar

Make the Most of Showcase with Version 10

Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
Blog

You’ve Upgraded Your Hardware. Now It’s Time to Upgrade Your Security Posture

If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
Blog

INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks

Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.