Guide
Powertech Password Self Help for IBM i: Self-Service Password Reset
Resetting disabled passwords is an inevitable activity. Read this guide to find out you can reduce password management costs and increase efficiency with an easy-to-use tool that allows IBM i users to reset their own passwords.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog
PCI Compliance Takeaways from the Target Data Breach
By Robin Tatam on Wed, 03/08/2017
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Article
The Modern Alternative to Authority Adoption
By Robin Tatam on Wed, 03/08/2017
There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
Article
Application Monitoring and More in Robot Console 6
By Chuck Losinski on Fri, 02/24/2017
As more applications on IBM i become Java- or web-based, they’re less likely to send their important messages to a message queue. But don’t worry—Robot Console has that covered.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Blog
What Is a Profile Swap and How Can It Help Secure IBM i?
By Robin Tatam on Thu, 02/09/2017
In this short video, IBM i security expert Robin Tatam explains what a profile swap is and how it helps secure your system.
On-Demand Webinar
44 Percent of Your IBM i Users Can Do WHAT?!
By Robin Tatam
Your IBM i power users are one of your greatest assets. But on most systems, they're also one of your greatest security vulnerabilities. Find out how to regain control.
Article
Customer Spotlight: Heartland Financial USA, Inc.
By Chuck Losinski on Tue, 01/17/2017
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
Guide
Dashboards Don't Work (Unless You Have a Metrics Management Strategy)
Tech has had a tremendous impact on the way today’s businesses seek continued growth and improvement. No matter what business they are in, executives everywhere are investing in technology that improves their business processes, gets them ahead of the competition and widens their margins. Ultimately, the return on that investment is determined by how well technology supports a business’ ability to...
On-Demand Webinar
How to Confront Your IBM i Message Queues
Learn best practices for message management on your IBM i, plus techniques for monitoring, tips for filtering, and tools for escalating and notifying team members of the most critical messages in a hurry.