Resources

Guide

Download "The Complete Guide to Securing IBM i Exit Points"

    Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
Article

Eight Steps Toward a Secure Hybrid Cloud Environment

Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Case Study

Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security

A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds across the...