Resources

Blog

An IBM i Hacking Tale

Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Article

Supporting ITIL Objectives

Many IT organizations are implementing ITIL as a strategy for improving IT Service Management. The ITIL framework provides best practices and structured processes for managing and delivering IT services.