Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Datasheet
Robot Monitor
Robot Monitor allows you to monitor and investigate issues on your IBM i and AIX operating systems, so you can resolve issues before they escalate and plan for future needs by tracking and analyzing past performance trends.
On-Demand Webinar
5 IBM i Monitoring Pain Points (and How to Solve Them)
Robot Monitor has helped hundreds of organizations handle their worst AS/400 monitoring headaches. Watch this webinar to learn how.
Article
How to Get Started with AIX/VIOS Monitoring in Robot Monitor
By Chuck Losinski on Wed, 11/01/2017
Learn how to create monitors and set thresholds for seven key metrics that are critical to AIX/VIOS performance.
Article
The Trick to Monitoring SAP on IBM i
By Chuck Losinski on Mon, 10/30/2017
Read this article and learn where to look outside your application to get end-to-end monitoring of SAP performance.
Article
What's Killing Your Response Time?
By Chuck Losinski on Wed, 09/27/2017
Is more utilization always a good thing? What other performance data should administrators pay attention to? Find out in this article.
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
On-Demand Webinar
A Fresh Look at SAP on IBM i
If SAP on IBM i is your ERP, watch this recorded webinar to understand its unique architecture and take away top monitoring tips.
On-Demand Webinar
Cloud Infrastructure Technologies for IBM i
Watch this webinar to learn how and when to use cloud technologies to modernize your IBM i infrastructure and bring more value to your organization in this highly available world.
On-Demand Webinar
15 Work Management Tips in 30 Minutes
By Dawn May
It’s time to manage your workload smarter, not harder. IBMer Dawn May dishes the dirt on how to get the best performance out of your IBM i workload. Watch now!
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
On-Demand Webinar
Monitor VIOS (and AIX) from Your IBM i
With more organizations running AIX/VIOS and IBM i on the same Power server, you need better visibility. Watch this webinar to see how Robot Monitor is your single solution for real-time monitoring, notification, and reporting for AIX, VIOS, and IBM i.
Article
Audit Tested & Audit Approved Instant Authority!
By Robin Tatam on Fri, 03/24/2017
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article
The Modern Alternative to Authority Adoption
By Robin Tatam on Wed, 03/08/2017
There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Blog
Your Biggest Challenge to IBM i User Onboarding
By Robin Tatam on Mon, 03/06/2017
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...