This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
During this recorded webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
Learn how to interpret the data you find on the Work with System Status (WRKSYSSTS) panel and how to set memory thresholds to avoid thrashing and optimize IBM i performance tuning.
Got questions about moving beyond SQL to Sequel Data Access? Get answers, and get the business intelligence your organization needs from your IBM i data.
Organizations that allow the use of free or unsecured file transfer services not only leave themselves vulnerable to data loss, ransomware and a whole range of other cyber threats, but they have no control or visibility of what information is being transferred and who receives it.
Ready to eliminate manual monitoring in Assure MIMIX? This article shows you how to start monitoring MIMIX and stop wasting your time and risking your irreplaceable data.
Watch this webinar where our panel of technology experts discuss the reasons why many organizations are taking advantage of SAN technology for virtualization, high availability, backup management, and more.
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
The coronavirus (COVID-19) situation is changing rapidly on a day-to-day basis, so we wanted to take this opportunity to address what it means for Clearswift and Fortra as a global organization and an employer, and how it might impact on our customers, prospects and partners.
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.