Resources

Article

Why Everyone Has a Crush on Linux—even IBM

Linux helps enterprises make IT more scalable and flexible. Supplemented by dedicated, Linux-compatible tools for job scheduling—like Automate Schedule—put organizations in a prime position to streamline operations to meet changing requirements.
Blog

Does Your Business Belong in the Cloud?

The cloud is all about access. It’s about getting access on-demand, access to resources needed for your growing demands, and controlling who has access to your information. Everybody is talking about it, but is the cloud the right answer for your business needs? And if so, which one?
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar

Audit and Control of Powerful Users on IBM i

Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Guide

Download “Identity & Access Management for IBM i”

      Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual...
On-Demand Webinar

Top Tips to Increase Programmer Productivity

You don’t need to be reminded that your time is valuable. Redundant processes, fumbling between programs, struggling to set up and test time-sensitive apps all require time that you could be spending in much more productive ways. In this session, we’ll show you how Abstract helps you eliminate busy work and streamline the development process. We’ll also explore how Anydate...
On-Demand Webinar

Streamline Your Development Process with Abstract

Your time is limited. You can’t spend it on redundant processes, fumbling between programs, or struggling to cross-reference your development environment. Your development staff could be spending their time being much more productive. All development projects, large or small, require control: Control of program changes Control of developer time Control of processes through...