Resources

Article

Virtual Tape Considerations for IBM i

This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
Guide

Robot in Modern IBM i Environments

Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Article

IBM on IASP for PowerHA Implementations

You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article

FlashCopy: Pros and Cons

IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Article

Backup Basics: Saving Your Data and Your Job

You need a backup strategy to test your company’s disaster recovery plan and, despite its reputation for reliability, administrators still need to back up their IBM i. A sound backup strategy should also restore individual user objects to account for human error.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Guide

Free eBook: Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook , you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
Guide

The Ultimate Guide to Investing in Secure File Transfer Software

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover: The...
Guide

6 Users to Put on Your Security Watch List

Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about. Sometimes, security threats come from the inside. In this ebook , you'll learn about eight user types we think you should put on...
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their impact on your security posture. One...
Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled. Download this guide for...