Blog
4 Reasons You Need Native Virus Scanning
By Robin Tatam on Thu, 03/09/2017
Many Power Systems users still believe Linux, AIX, and IBM i are immune to viruses because viruses are a Windows threat. That’s not the case in today’s connected environments.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article
How Object Integrity Scanning Enhances IBM i Security
Tue, 03/07/2017
IBM i has had superior built-in security features from the beginning. However, as internetworking increases and open protocols and servers become the norm, additional protection is needed.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Guide
Build vs. Buy: The Argument Against Developing a Solution for Exit Point Security
Before you commit the resources to develop an in-house solution for exit point security, read our list of issues to consider. You might decide it’s neither easy nor cost-effective to set up and monitor your own in-house solution.
Guide
Dashboards Don't Work (Unless You Have a Metrics Management Strategy)
Tech has had a tremendous impact on the way today’s businesses seek continued growth and improvement. No matter what business they are in, executives everywhere are investing in technology that improves their business processes, gets them ahead of the competition and widens their margins. Ultimately, the return on that investment is determined by how well technology supports a business’ ability to...
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...
Guide
Controlling SQL Updates Using Powertech Exit Point Manager for IBM i
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without any control by the...
On-Demand Webinar
Ask a Capacity Management Expert, Part One
Thu, 09/15/2016
Listen to this on-demand webinar to answer questions like: What does it take to be successful in capacity management? How do you manage capacity in the cloud? What are the common roadblocks—and how can we avoid them?
On-Demand Webinar
Capacity Management For Your Entire Infrastructure: Physical, Virtual & Cloud
By Bob Torz
Capacity Management has evolved over the last 40 years from spreadsheets and manual processes to full automation. In this webinar, TeamQuest will explain best practices in capacity management and walk through examples of predicting infrastructure requirements for your physical, virtual & cloud environments.
Article
Intermapper Application for Splunk Answers Need for Log Analytics in Network Management
By Shamus McGillicuddy on Wed, 09/07/2016
The Intermapper application for Splunk brings together Intermapper's robust network monitoring software with Splunk's high-powered searches and analysis of data stores.