Resources

On-Demand Webinar

Top Tips to Increase Programmer Productivity

You don’t need to be reminded that your time is valuable. Redundant processes, fumbling between programs, struggling to set up and test time-sensitive apps all require time that you could be spending in much more productive ways. In this session, we’ll show you how Abstract helps you eliminate busy work and streamline the development process. We’ll also explore how Anydate allows user jobs or...
On-Demand Webinar

Streamline Your Development Process with Abstract

Your time is limited. You can’t spend it on redundant processes, fumbling between programs, or struggling to cross-reference your development environment. Your development staff could be spending their time being much more productive. All development projects, large or small, require control: Control of program changes Control of developer time Control of processes through use of flowcharts ...
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

10 Ways to Protect IBM i from Cyberattacks

IBM i and other servers are frequent targets of cyberattacks, according to the Data Breach Investigations Report. Watch this 40-minute recorded webinar to learn how to mitigate common threats to your organization’s data.
On-Demand Webinar

Why You Shouldn’t Worry about Hackers

IBM i servers face an even more likely threat than hackers: one that’s already infiltrated the advanced firewall, has engineered the capability to access critical business data, and has been operating without detection for years.
On-Demand Webinar

Top 10 Security Vulnerabilities on IBM i

IBM i is one of the most securable systems available—but unless you actually use the features IBM has provided, the system is vulnerable.
On-Demand Webinar

7 Habits Of Highly Secure Organizations

Everyone knows that security is important, but implementing a plan for compliance and data protection can be intimidating. Watch this webinar to learn where to focus your resources and attention to make the biggest impact.
On-Demand Webinar

Getting Started with IBM i Security

Watch this recorded webinar, hosted by certified auditor and IBM i expert Robin Tatam, to learn about important IBM i security considerations and strengthen your data protection.
On-Demand Webinar

The Three Levels of AP Automation

Is your company ready to automate its AP processes? Which level will best meet your needs: simple, advanced, or full? Watch this presentation to learn how to choose the best fit for your company.
Article

iSeries Penetration Testing

Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.
On-Demand Webinar

What’s New in IBM i Security in V7R3 and V7R2

IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i. Get the details on the new security features.
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Guide

Download "IBM i User Provisioning"

Even when user profiles are painstakingly set up, keeping them consistent and secure can be an uphill battle. All it takes is one over-privileged user and your most critical data could be changed, deleted, or worse. You need help—not only to set up new users with discretion, but also to keep them consistent across roles, departments, and systems. Our exclusive white paper includes expert advice...