Resources

Guide

Download "How IT Professionals Can Navigate SOX Compliance"

Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge. With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital. This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
Guide

Download "How IT Professionals Can Navigate HIPAA Compliance" Guide

The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge. As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever. This compliance guide breaks down some of the thorniest...
Blog

Do You Need Enterprise Scheduling Software?

Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article

Have You Met SAM?

Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.
Article

Interfaces with Robot Schedule

If you’re using EnterpriseOne or SAP, it may be to take a closer look at the security and business process automation that Robot Schedule can offer these key applications on IBM i. We don’t talk enough about the integration we’ve done between Robot Schedule and EnterpriseOne (formerly JD Edwards, now owned by Oracle) and SAP.