Resources

Guide

Download "A Guide to Practical Single Sign On"

The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple. With single sign on (SSO), you can eliminate passwords—and the cost associated with them—by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to achieving the ROI...
Product Video

Watch a Demo of Core Privileged Access Manager (BoKS)

Transform your server environment into one streamlined managed security domain. Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...
Video

5 IBM i Security Quick Wins

IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
Article

Comparing Different Methods for Calculating Health and Risk

How do you calculate IT health and risk? There are different methods you can use, depending on your needs. The most common methods for determining IT infrastructure health are: Threshold comparison Enhanced threshold comparison Event detection Variation from normal Allocation comparison Queuing theory for health On the other hand, the most common methods for calculating IT...
Article

A Roadmap for Consolidation

There are five key steps when planning a consolidation strategy. Considerations for each step are outlined below.