Resources

Article

Two-Way Message Response with Robot

You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Datasheet

Robot Alert

Robot Alert sends and receives email, text, and SNMP messages in reaction to IBM i events.
Datasheet

Robot Console

Robot Console is a fully automated, customizable tool that sends you only the IBM i messages you need to see. This makes your monitoring more effective—you won’t miss crucial information—and more efficient.
Datasheet

Powertech Antivirus for IBM i

Native Protection for IBM i Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus. Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Datasheet

Powertech Authority Broker for IBM i

Satisfy your auditor requirements with reports that provide a complete audit trail of privileged user activity with Powertech Authority Broker for IBM i. Schedule a demo today.
Article

The Many Ways Robot Supports SNMP

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Article

Message Received?

When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Blog

Building a Better Virus Trap

Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?