You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Robot Console is a fully automated, customizable tool that sends you only the IBM i messages you need to see. This makes your monitoring more effective—you won’t miss crucial information—and more efficient.
Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
As more applications on IBM i become Java- or web-based, they’re less likely to send their important messages to a message queue. But don’t worry—Robot Console has that covered.
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
Learn best practices for message management on your IBM i, plus techniques for monitoring, tips for filtering, and tools for escalating and notifying team members of the most critical messages in a hurry.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.