Resources

Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Article

What Can Intermapper Monitor?

What can Intermapper monitor? Just about anything. Learn how to monitor any device with an IP address, making your network visibility as comprehensive as possible.
Guide

Enterprise Monitoring Success

Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.