Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
On-Demand Webinar
The Virtualization Blind Spot
75 percent of IBM i shops run multiple partitions per server. But what aren't they seeing? Watch now and learn how to monitor virtualized IBM i environments with Robot Monitor.
Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Datasheet
Robot Monitor
Robot Monitor allows you to monitor and investigate issues on your IBM i and AIX operating systems, so you can resolve issues before they escalate and plan for future needs by tracking and analyzing past performance trends.
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
On-Demand Webinar
5 IBM i Monitoring Pain Points (and How to Solve Them)
Robot Monitor has helped hundreds of organizations handle their worst AS/400 monitoring headaches. Watch this webinar to learn how.
Article
How to Get Started with AIX/VIOS Monitoring in Robot Monitor
By Chuck Losinski on Wed, 11/01/2017
Learn how to create monitors and set thresholds for seven key metrics that are critical to AIX/VIOS performance.
Article
The Trick to Monitoring SAP on IBM i
By Chuck Losinski on Mon, 10/30/2017
Read this article and learn where to look outside your application to get end-to-end monitoring of SAP performance.
Datasheet
Intermapper App for Splunk Enterprise
If you need proactive network monitoring and visual mapping, Intermapper will give you real-time knowledge of your network, affordably and with seamless integration into Splunk.
Article
What's Killing Your Response Time?
By Chuck Losinski on Wed, 09/27/2017
Is more utilization always a good thing? What other performance data should administrators pay attention to? Find out in this article.
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
On-Demand Webinar
A Fresh Look at SAP on IBM i
If SAP on IBM i is your ERP, watch this recorded webinar to understand its unique architecture and take away top monitoring tips.
On-Demand Webinar
Cloud Infrastructure Technologies for IBM i
Watch this webinar to learn how and when to use cloud technologies to modernize your IBM i infrastructure and bring more value to your organization in this highly available world.
On-Demand Webinar
15 Work Management Tips in 30 Minutes
By Dawn May
It’s time to manage your workload smarter, not harder. IBMer Dawn May dishes the dirt on how to get the best performance out of your IBM i workload. Watch now!
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...