Product Video
Watch a Demo of Event Manager
Separate the critical events from the noise with security information and event management.
Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
On-Demand Webinar
Capacity Planning for Your Peak Season
By Doug Mewmaw
Are you confident that your Power Systems servers are set up to handle your busiest season? Watch this webinar to learn tired-and-true methodology from the experts.
Article
Capacity Planning and the Culture of Proof
By Timothy Prickett Morgan on Fri, 05/31/2019
Capacity planning is one of the most important things that a company will do, and yet there are still many companies that do it on the back of the envelope. Read this article and learn how to do it right.
On-Demand Webinar
Easy IBM i Migrations with Near-Zero Downtime
Upgrading your IBM Power Systems hardware? Robot HA can help you migrate your IBM i data with little to no downtime. Learn how here!
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
Five Malicious Insider Threat Indicators and How to Mitigate the Risk
By Bob Erdman on Fri, 04/05/2019
There are some telltale signs of malicious insider threats that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.
On-Demand Webinar
Robot HA in PowerHA Environments
PowerHA is robust, but it may not cover all your bases—SYSBAS, that is! Watch this webinar and learn how to replicate data and applications in SYSBAS.
Article
Audit for Role Swap Readiness with Robot HA
By Tom Huntington on Fri, 03/15/2019
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Datasheet
Performance Navigator
Historical performance monitoring and modeling across your IT environment
In an increasingly virtualized world, it’s becoming more and more difficult to understand performance across your IT enterprise. Performance Navigator performance analysis software allows you to see what’s truly occurring on your mission critical systems. With current day and historical performance data, you know exactly...
Article
Top 5 Capacity Planning Mistakes on IBM i
By Tom Huntington on Tue, 02/12/2019
When it comes to capacity planning for IBM i, skip the shortcuts. This article shares expert recommendations on how to avoid the most common capacity planning mistakes.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
On-Demand Webinar
Virtualization Considerations for POWER9 Hardware Changes
Watch this webinar and learn how to monitor and replicate your virtualized IBM i environment using Robot Monitor and Robot HA.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
Article
If It Has Moving Parts, Someday It's Going to Fail.
Sat, 11/03/2018
Check out IBM's new READ INTENSIVE SSDs.
This is a note to highlight some of the pros and cons - and dig a little deeper into one of the cons - of IBM's recently announced new class of solid state disk drives, "read intensive" (RI) SSDs.
The new RI-SSD comes in one flavor, a 1.86 TB drive. The new concept to wrap your head around is that the drive will "wear out" if you write too much over the...
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.