Resources

Blog

Access Data While Maintaining IBM i Security

Why do you need extra data access security on IBM i? Find out. Plus, learn how to secure data access, let users analyze data, and distribute data securely.
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
Datasheet

Sequel Data Access

Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
Guide

Getting Started with Intermapper Flows

This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.