Resources

Article

Small but MIGHTY: Controlling the *CLS Object Type

While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Case Study

Alon USA Locks Down the IFS with Powertech Antivirus for IBM i

Like many IBM shops, Alon USA found comfort in the seeming immunity of IBM i to viruses. All PCs in the company were running anti-virus software but, having operated for more than a decade without incident, Alon USA’s IT director saw no need for protective measures on IBM i. Sound familiar?
Case Study

Volvo: The Power to Perform

Volvo UK uses Robot Monitor to drive optimal performance monitoring across two data centers and keep a user community of 11,000 on course for success. See how.