Resources

Blog

Access Data While Maintaining IBM i Security

Why do you need extra data access security on IBM i? Find out. Plus, learn how to secure data access, let users analyze data, and distribute data securely.
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
Article

The Many Ways Robot Supports SNMP

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Datasheet

Sequel Data Access

Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.