Blog
Why Workload Automation is Critical in the Cloud Era
Tue, 03/14/2017
Cloud applications are transforming IT environments. Find out how workload automation fits into the picture.
Article
Workload Automation: A Key Tool in a Fast Paced Tech Landscape
By Dan Twing on Tue, 03/14/2017
Workload automation is evolving to allow IT to move faster and integrate new technologies. What innovations would you like to see?
Article
Orchestrating a Symphony of Application Automation
By Steve Brasen on Tue, 03/14/2017
An enterprise job scheduler is key to orchestrating disparate applications and complex business processes.
Article
Why Everyone Has a Crush on Linux—even IBM
Tue, 03/14/2017
Linux helps enterprises make IT more scalable and flexible. Supplemented by dedicated, Linux-compatible tools for job scheduling—like Automate Schedule—put organizations in a prime position to streamline operations to meet changing requirements.
Blog
Does Your Business Belong in the Cloud?
Tue, 03/14/2017
The cloud is all about access. It’s about getting access on-demand, access to resources needed for your growing demands, and controlling who has access to your information. Everybody is talking about it, but is the cloud the right answer for your business needs? And if so, which one?
Guide
Using the Cloud for Mission-Critical Systems
In order to make cloud computing highly available and easy to use, there has to be an infrastructure in the background, like enterprise scheduling software.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article
The Modern Alternative to Authority Adoption
By Robin Tatam on Wed, 03/08/2017
There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Blog
Your Biggest Challenge to IBM i User Onboarding
By Robin Tatam on Mon, 03/06/2017
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Blog
What Is a Profile Swap and How Can It Help Secure IBM i?
By Robin Tatam on Thu, 02/09/2017
In this short video, IBM i security expert Robin Tatam explains what a profile swap is and how it helps secure your system.
On-Demand Webinar
44 Percent of Your IBM i Users Can Do WHAT?!
By Robin Tatam
Your IBM i power users are one of your greatest assets. But on most systems, they're also one of your greatest security vulnerabilities. Find out how to regain control.
Blog
Selecting Enterprise Automation Software for Your Business
Fri, 02/03/2017
Choosing the right enterprise software can give your business a competitive edge, but the wrong choice can be extremely costly. Find out which factors to consider when evaluating enterprise solutions.