Resources

Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.
Article

Windows Azure Automation

Cloud computing, cloud storage, cloud database…we all have heard about the “cloud.” Cloud computing has gained tremendous visibility in recent years. According to research firm, Gartner, “By 2012, 80% of Fortune 1000 enterprises will be using some cloud computing services, 20% of business will own no IT assets.” In addition, small businesses are attracted to the small startup costs and lower TCO...
Article

Benefits of Web Server Management Console

Just like the desktop version of SMC, the Web SMC is a web-based interface for centralized management and administration, and allows you to graphically manage all elements of the Automate BPA Server including workflows, the Repository, users and agents. You can also access reports and calendars as well as configuring system settings and options.
Article

Using the Dashboard to Drive Your Business Performance

Today’s growing information and communication technology is altering how companies operate and move forward in a global environment. Because of the real-time nature of information being transmitted, organizations need a way to easily track up-to-the minute performance and operational statistics in order to make effective business decisions more rapidly.
Article

Working with Agent Groups in BPA Server

An Agent Group is a distinct Automate BPA Server object that contains one or more Agents within a logical group. They can be used as workflow objects in place of individual Agents to distribute conditions and tasks to multiple machines across an enterprise. The use of Agent Groups can be more convenient in situations where multiple agents need to be selected for automated execution. Instead of...
Article

Data Store Migration Utility

Data migration is the process of transferring data from one hardware or software configuration to another. It can be a standard yet crucial element of IT operations, allowing organizations the ability to maintain the integrity of important data while moving forward to face constantly changing technologies. The downside being that data migration is often times consuming and causes major disruptions as a result of downtime or application performance problems.
Article

Automate BPA Server Cross-Platform Automation

Introduction Increasing numbers of businesses require solutions to help unify their disparate computing platforms to better improve productivity. The upcoming BPA Server version 7.1.0.0 upgrade will enable organizations to create these kinds of solutions by including support for direct execution across multi-platforms. This new functionality broadens the spectrum of Automate BPA Server by...