Article
13 FAQs on Switching from Query/400 to Sequel
By Heath Kath on Wed, 10/20/2021
Find out why you should choose Sequel Data Access for your IBM i queries—and leave Query/400 behind.
On-Demand Webinar
I Have All Object Authority and I’m Not Afraid to Use It!
By Amy Williams
In this webinar, security expert Amy Williams explores best practices for All Object authority and strategies for correcting this vulnerability.
On-Demand Webinar
Protecting Mission-Critical Systems from Modern Malware Threats
By Bob Erdman
Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware can just as easily target your servers, both on-premise and in the cloud.
As malware and ransomware attacks have grown, so have the number of compliance mandates—and yet many organizations are still getting breached.
Join this webinar with Bob Erdman, cybersecurity expert and Associate Director of...
On-Demand Webinar
Survival of the Fittest: Defending IBM i Against a Cyber Attack
By Robin Tatam
Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses?
The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details.
In this webinar, IBM i...
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
On-Demand Webinar
Malware on Power Systems Servers: Breaking Down the Myths
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
On-Demand Webinar
Protecting Power Servers from Ransomware: How and Why
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
On-Demand Webinar
How to Modernize Your Query/400 Queries
Sequel software makes your transition to modern data access and analysis from Query/400 simple. Watch this webinar to see how.
On-Demand Webinar
Expert Tips for IBM i Security: Beyond the Basics
By Robin Tatam
In this session, IBM i security expert Robin Tatam will provide a quick recap of IBM i security basics and guide you through some advanced cybersecurity techniques that can help you take data protection to the next level.
On-Demand Webinar
What’s New with Sequel?
Watch this webinar to learn the latest enhancements to Sequel, business intelligence software for IBM i.
On-Demand Webinar
Simple Strategies for Malware Defense on IBM i - presented with COMMON
By Robin Tatam
With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux.
Watch this webinar to learn about advanced malware threats and simple...
On-Demand Webinar
Fight Cyber Threats with IBM i Encryption
By Sandi Moore
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
On-Demand Webinar
How a Remote Workforce Affects IBM i Security
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore provides valuable information to help minimize your exposure to malware and viruses, even with a remote workforce.
On-Demand Webinar
What Does Digital Transformation Mean for IBM i Data?
Digital transformation is not just a buzzword. It opens the door to deeper insight from your data. Watch this webinar to learn more!
On-Demand Webinar
Top IBM i Security Vulnerabilities and How to Address Them
By Robin Tatam
Watch this webinar to learn how to identify the top IBM i security vulnerabilities —and the steps you can take to protect your organization.
On-Demand Webinar
Combating Ransomware: Building a Strategy to Prevent and Detect Attacks
By Bob Erdman
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.