Resources

Blog

Does Your Business Belong in the Cloud?

The cloud is all about access. It’s about getting access on-demand, access to resources needed for your growing demands, and controlling who has access to your information. Everybody is talking about it, but is the cloud the right answer for your business needs? And if so, which one?
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Blog

SFTP vs. FTPS: The Key Differences

Which option for securing sensitive files in transit is the best for your organization? Read this article for an in-depth look at FTP vs. SFTP vs. FTPS, and their key differences.
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Blog

Who's Afraid of IASPs?

As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog

The 9 Server Sprawl Questions You Need to Ask

For budding companies, server sprawl may be just one of many growing pains—a temporary inconvenience for a greater good. But if you’re struggling to complete processes on time, stalling with the auditors, and jumping from server to server whenever an error occurs, it’s time to ask the tough questions.
Blog

The #1 Step Before Automation

An up-to-date and comprehensive runbook won't win you any awards. But when you get the green light to implement a workload automation tool, documentation is your lifeline. Unfortunately, most runbooks aren’t up to snuff.