Resources

On-Demand Webinar

Audit and Control of Powerful Users on IBM i

Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
On-Demand Webinar

Cutting Through IBM i Security Confusion

In this on-demand webinar, a security expert answers questions about the most confusing aspects of IBM i security. Join us for information that's useful for beginners and veterans.
On-Demand Webinar

Top Tips to Increase Programmer Productivity

You don’t need to be reminded that your time is valuable. Redundant processes, fumbling between programs, struggling to set up and test time-sensitive apps all require time that you could be spending in much more productive ways. In this session, we’ll show you how Abstract helps you eliminate busy work and streamline the development process. We’ll also explore how Anydate allows user jobs or...
On-Demand Webinar

Streamline Your Development Process with Abstract

Your time is limited. You can’t spend it on redundant processes, fumbling between programs, or struggling to cross-reference your development environment. Your development staff could be spending their time being much more productive. All development projects, large or small, require control: Control of program changes Control of developer time Control of processes through use of flowcharts...
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

10 Ways to Protect IBM i from Cyberattacks

IBM i and other servers are frequent targets of cyberattacks, according to the Data Breach Investigations Report. Watch this 40-minute recorded webinar to learn how to mitigate common threats to your organization’s data.
On-Demand Webinar

Why You Shouldn’t Worry about Hackers

IBM i servers face an even more likely threat than hackers: one that’s already infiltrated the advanced firewall, has engineered the capability to access critical business data, and has been operating without detection for years.
On-Demand Webinar

Top 10 Security Vulnerabilities on IBM i

IBM i is one of the most securable systems available—but unless you actually use the features IBM has provided, the system is vulnerable.
On-Demand Webinar

7 Habits Of Highly Secure Organizations

Everyone knows that security is important, but implementing a plan for compliance and data protection can be intimidating. Watch this webinar to learn where to focus your resources and attention to make the biggest impact.