Resources

On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

Next Generation Job Scheduling

Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
On-Demand Webinar

Business Process Automation with Robot

Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
Article

iSeries Penetration Testing

Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
On-Demand Webinar

What’s New in IBM i Security in V7R3 and V7R2

IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i. Get the details on the new security features.
Guide

Download "How IT Professionals Can Navigate SOX Compliance"

Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge. With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital. This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
Guide

Download "How IT Professionals Can Navigate HIPAA Compliance" Guide

The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge. As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever. This compliance guide breaks down some of the thorniest...
Blog

Do You Need Enterprise Scheduling Software?

Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.