On-Demand Webinar
What’s the IBM i Community Saying About Business Intelligence?
Hear how the IBM i community achieve their business intelligence goals.
On-Demand Webinar
IBM i Data Access in Less Than 60 Minutes
Accessing, analyzing, and reporting on your IBM i and remote databases like Excel can be quicker or easier than with Sequel.
Blog
Multinational Healthcare Organization Implements Fast, Easy, and Secure Data Reporting
Wed, 05/15/2019
Making data accessible and ensuring data privacy are essential in today’s healthcare market.
One multinational healthcare organization faced inefficient processes that slowed them down. Employees around the organization were left waiting for reports with vital information like admissions, discharges, bills, and collections.
So, they turned to Sequel Data...
On-Demand Webinar
Secure and Automate Your File Transfers for IBM i
By Heath Kath
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
On-Demand Webinar
How to Access Meaningful Information with Data Visualization
It's not news that everyone needs accurate business data these days—and they needed it 5 minutes ago. Real-time, actionable information needs to be simple to access and shouldn't require IT to translate it into something a business user will understand.
In this webinar you'll see:
How Sequel makes your KPIs accessible in powerful dashboards
How many ways users can analyze their data in client...
On-Demand Webinar
Your Power Half Hour—From Query to BI with Sequel
Your IT team is asked to provide IBM i data to people from all over the organization. Upper management wants big picture stats to see how your organization is doing with key performance indicators. Operational users need detailed information—sometimes even down to the minute—to improve operations. Sales needs customer information to provide better service and metrics to make data-driven decisions....
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool!In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
On-Demand Webinar
How to Modernize Your IBM i Queries with Sequel
You don't have to move your data off of IBM i to modernize your queries and give users real-time information in a modern environment. Sequel can help.
Blog
Access Data While Maintaining IBM i Security
Tue, 10/16/2018
Why do you need extra data access security on IBM i? Find out. Plus, learn how to secure data access, let users analyze data, and distribute data securely.
Guide
Data Access in a Big Data World: How to Access Big Data so You Can Use It
With organizations collecting more customer, transactional, and relational data than ever before, data volumes are beginning to expand past their system’s processing capacity. But big data doesn’t have to be alarming. Go beyond the hype and conquer your IBM i data.
On-Demand Webinar
The Keys to Securing Data in Motion
In this third-party webinar from InfoSecurity Magazine, you'll explore the five keys to securing sensitive data in motion—compliance, collaboration, encryption, secure email, and automation—and how to implement them in your organization.
Guide
The Ultimate Guide to Investing in Secure File Transfer Software
We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover:The benefits...
Guide
6 Users to Put on Your Security Watch List
Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about.Sometimes, security threats come from the inside.In this ebook, you'll learn about eight user types we think you should put on your...
Blog
The Ultimate Guide to Investing in Secure File Transfer Software
By Bob Luebbe on Thu, 08/23/2018
Are you struggling to secure your file transfers? Need to invest in secure file transfer software but aren’t sure where to look? We’ve got you covered. Walk through the buying process, from start to finish, with this free Ultimate Secure Managed File Transfer Buyer’s Guide.
On-Demand Webinar
Creating Simple Yet Powerful Queries with Sequel
Query-building should be functional and flexible to fit your organization's needs. Sequel helps you build powerful and simple queries for better data access.
On-Demand Webinar
Business Intelligence is Changing: Make Your Game Plan
Don’t let business intelligence send your head spinning. Watch this webinar to learn how to set your IT department up for BI success in 2018.
Blog
Does Data Analysis Have to Be So Hard?
By Heath Kath on Fri, 05/25/2018
Find out how to get your AS400 or iSeries data and turn it into insight with simple data analysis.