On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
Datasheet
Sequel Data Access
Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
Blog
Faster and Easier IBM i Password Resets
By Robin Tatam on Wed, 11/08/2017
Security expert Robin Tatam explains an easy way to spend less time and resources on resetting IBM i passwords.
On-Demand Webinar
How to Do Business Intelligence—Without the Big Budget
You've been manually querying data for years, but keeping up with the status quo just isn't cutting it. Find out how to get better BI (at a price you can afford).
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
On-Demand Webinar
How to Deliver Useful Data Insights (Without Overloading IT)
Learn how to help your users help themselves to data insight.
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
On-Demand Webinar
Be the Data Access Hero—With Minimal Effort
Business users today want fast and easy data access—without waiting. You can be their hero. Watch the webinar to learn how.
Blog
Five Causes of Performance Bottlenecks in IT
Wed, 08/09/2017
As IT infrastructures continue to grow more complex, finding performance bottlenecks gets hard. That’s why it’s absolutely essential that IT teams have the tools, training, and resources necessary to quickly identify causes of poor application performance.
Blog
Performance Management
By Per Bauer on Sat, 07/22/2017
What is Performance Management?
IT performance management is responsible for everyday aspects of capacity management, like monitoring performance and resources, planning changes to make efficient use of resources, analyzing performance, and reporting back to the business.
Now more than ever, your company’s bottom line rests on your ability to provide 24/7...
On-Demand Webinar
How to Secure Data Access on IBM i
By Robin Tatam
Let Robin Tatam and Heath Kath show you how to provide IBM i data access to everyday users—without compromising security.
Blog
IT Maturity
By Per Bauer on Fri, 06/16/2017
What are your optimization goals?
An optimization initiative is typically triggered by one of the drivers listed below and the focus is dictated by your overall business objectives. But singlehandedly focusing on one objective may negatively impact your capabilities in the other areas. This can reduce the overall service quality and offer limited to no real value. In order to achieve concurrent...
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
On-Demand Webinar
How to Drive Business Value with Capacity Management
By Per Bauer
Today’s businesses—and IT environments—are complex. Technology is changing rapidly, which makes it all the more difficult to manage. You may have considered capacity management to right-size your IT environment. But you might be wondering, “What do I get out of this?” Find out how capacity management will have an impact on your bottom line (and beyond).