Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Using an outdated business intelligence solutions like Query/400 or an unsupported product like Db2 Web Query for i can put limitations on your data. Watch this video to learn how you can unlock your data’s full potential by using Sequel.
Watch this webinar for insight from our knowledgeable Sequel support team and to hear their answers to some of the most frequently asked questions from customers.
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible? Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application Security...
Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
Watch our webinar on Sequel's second interface: Repository Mode. Learn how Repository Mode makes saving your Sequel objects easier with security management, Active Directory authentication, and IFS integration.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy. This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated requirements. Having a...
Viewpoint Scripts are one of the most versatile tools in your Sequel toolbox. Watch as business intelligence expert Brandy Lulling demonstrates how and when to use them.
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
Data access expert Greg Schmidt demonstrates how Sequel puts the power of your business data in the hands of your users using Excel integration, automated data delivery, and much more.
Join Sequel Support Manager Sheryl Quinlan as she breaks down Sequel Viewpoint’s key components, how and when to use them, and other best practices for maximizing your Sequel experience.