Resources

Article

With Public Cloud OS Instances Growing, Security Challenges Grow, Too

“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even...
Article

The Many Ways Robot Supports SNMP

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Datasheet

Robot Monitor

Robot Monitor allows you to monitor and investigate issues on your IBM i and AIX operating systems, so you can resolve issues before they escalate and plan for future needs by tracking and analyzing past performance trends.
Datasheet

Network Server Suite

Network Server Suite provides comprehensive monitoring and automation for Windows, AIX/VIOS, and Linux servers and SNMP devices.
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
On-Demand Webinar

Monitor VIOS (and AIX) from Your IBM i

With more organizations running AIX/VIOS and IBM i on the same Power server, you need better visibility. Watch this webinar to see how Robot Monitor is your single solution for real-time monitoring, notification, and reporting for AIX, VIOS, and IBM i.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Guide

Essentials for Privileged Access Management

Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide

Controlling SSH for Security and Compliance

SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Article

New Approaches to the SWIFT and PCI-DSS Framework

THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate...
Article

Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies

System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.