Resources

On-Demand Webinar

5 Myths About Encryption on IBM i

In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar

Encryption on IBM i Simplified

DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Press Release

Second Marriott Data Breach Affects 5.2M Guests

Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.