Resources

Article

Stay on Top of Security with Security Scan

Security and compliance adherence has elevated in criticality over the past few years and has now taken its rightful place as a primary IT initiative, alongside virtualization and disaster preparedness. The necessity for better data protection has landed front-and-center in the public eye following some of the largest data breaches on record.
Article

The Road To Security Starts with a Security Scan

Sometimes, there are known vulnerabilities that clearly need to be mitigated as soon as possible—such as application users running with *ALLOBJ special authority. But, often there isn’t a thorough understanding of what’s wrong with a server’s configuration or what should be addressed first.
Article

iSeries Penetration Testing

Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Article

Don’t Be Exposed In *PUBLIC!

Security typically operates so that users who are not granted authority have no authority. IBM i security, however, has a unique concept known as *PUBLIC.
Article

What's New for Security in IBM i 7.1

IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Article

Discover Automate's New Capabilities for Office 365

With the eagerly anticipated release of Microsoft’s cloud-based service, Office 365, on June 28, Network Automation immediately set to work on ensuring the current Microsoft Office automation facilities in Automate were enhanced to provide its customers with equivalent automation capabilities.
Article

AutoMate Bridges the Gap Between Disparate Applications

Automate from Fortra provides application security, streamlined communication including sending emails and text messages to IT regarding successful or failed tasks, error handling, and flexibility and versatility via its highly coveted development interface (no programming or scripting needed).
Article

mySQL and the SQL Query Action

Automate can easily interact with a mySQL server and its associated databases through the SQL Query and SQL Stored Procedure actions. The document explains how to setup a mySQL data source connection through Automate that can be used to run queries against a mySQL database.
Article

Debugging Tasks

We'll explore some of the techniques you can use to debug tasks in the Automate Task Builder. Several features available in Automate 6.1 can help make this an easier process.