Resources

On-Demand Webinar

Repository Mode: Sequel’s Hidden Gem

Watch our webinar on Sequel's second interface: Repository Mode. Learn how Repository Mode makes saving your Sequel objects easier with security management, Active Directory authentication, and IFS integration.
Datasheet

Webdocs Forms Management

Increase efficiency with faster data capture and integrate with your back-end systems using Webdocs Forms Management.
News Article

Digital Journal: FBI’s Warning Around Sextortion Schemes

The FBI has issued a warning about the use of "deepfakes" in a new wave of sextortion schemes. In his interview with Digital Journal, John Wilson examines the techniques used and provides valuable tips to help protect children from such scams.
Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals,...
On-Demand Webinar

Help! I inherited an IBM i!

If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
News Article

Forbes Advisor: Pig-Butchering Scams

In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
News Article

Forbes Advisor: Beware Of Loan Scams

In his latest Forbes Advisor article, John Wilson discusses loan scams and shares 7 red flags to help identify and avoid fraudulent loan offers.