Resources

Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Article

What Can Intermapper Monitor?

What can Intermapper monitor? Just about anything. Learn how to monitor any device with an IP address, making your network visibility as comprehensive as possible.
Guide

Enterprise Monitoring Success

Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog

Network Monitoring for the Back-to-School Season

With the start of the school year upon us, IT administrators everywhere are preparing their networks for surges in traffic as students and teachers return. But what do they need to ensure a smooth transition from the slow summer months to the busy school year?
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that distract from other critical projects? We...