Blog
What’s the Future of Your Data?
By Mike Stegeman on Fri, 04/06/2018
Find out why it’s important to plan for the future of your data now.
On-Demand Webinar
3 Skills You DON’T Need to Build Awesome Dashboards
Dashboards are everywhere these days. But when you’re working with data from IBM i, building dashboards seems like an impossible challenge...
On-Demand Webinar
3 Ways to Get Real-Time Insights Into Your Business
By Heath Kath
Your IT team is charged with delivering the data the business needs. The only problem is that the data means nothing on its own...
On-Demand Webinar
Reduce the Cost and Effort of IBM i Auditing
By Robin Tatam
IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
Blog
3 Ways to Share IBM i Data (Without Losing Your Mind) [Webinar Recap]
By Heath Kath on Tue, 01/16/2018
On-Demand Webinar
3 Ways to Share IBM i Data (Without Losing Your Mind)
By Heath Kath
There are so many ways that different functional groups want their information delivered today. And there’s simply not enough time to do it all—until now.
Datasheet
Sequel Data Access
Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
On-Demand Webinar
How to Do Business Intelligence—Without the Big Budget
You've been manually querying data for years, but keeping up with the status quo just isn't cutting it. Find out how to get better BI (at a price you can afford).
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
On-Demand Webinar
How to Deliver Useful Data Insights (Without Overloading IT)
Learn how to help your users help themselves to data insight.
On-Demand Webinar
Be the Data Access Hero—With Minimal Effort
Business users today want fast and easy data access—without waiting. You can be their hero. Watch the webinar to learn how.
On-Demand Webinar
How to Secure Data Access on IBM i
By Robin Tatam
Let Robin Tatam and Heath Kath show you how to provide IBM i data access to everyday users—without compromising security.
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Guide
Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"
Data leaks and operational disruptions can come from any source—internal or external.
To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS).
The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.
Download this guide...
Article
Generate and Distribute Audit Reports Automatically
By Robin Tatam on Mon, 04/03/2017
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.