Resources

Guide

Getting Started with Intermapper Flows

This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Guide

Download "IBM i Encryption: How to Protect Your Database"

    Learn your options for encrypting IBM i data. Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property. Encryption is widely recognized as the most effective way to ensure...