Resources

Datasheet

Powertech Risk Assessor for IBM i

Powertech Risk Assessor for IBM i automates the process of gathering security information. Schedule a demo today.
Blog

Access Data While Maintaining IBM i Security

Why do you need extra data access security on IBM i? Find out. Plus, learn how to secure data access, let users analyze data, and distribute data securely.
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Product Video

Intermapper Feature Tour

Don't have time to join our live webinar? Get the Intermapper Feature Tour on-demand! Intermapper network monitoring software is both powerful and easy to use. Get visibility into real-time network performance with our flexible network mapping and monitoring solution for all your physical and virtual equipment. Let Kevin Jackson, our Technical Solutions Consultant, give you a guided tour. Watch...
Article

How to Download an ODBC Driver

Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article

FAQs about Performance Navigator

Will this product hurt the performance of my IBM i®? You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service. How is Performance Navigator compared to PM? Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.