Resources

Guide

Robot in Modern IBM i Environments

Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Datasheet

Robot Save

Robot Save provides automated backup, recovery, and encryption for IBM i. Schedule a demo today.
Datasheet

Powertech Multi-Factor Authentication

Powertech Multi-Factor Authentication is a robust MFA solution for IBM i (AS/400, iSeries), it is a simple and effective way to ensure the users accessing your systems are who they say they are. Schedule a demo today.
Datasheet

Powertech Multi-Factor Authentication Compliance Datasheet

Comply with Security Standards, Including PCI DSS The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
Guide

Getting Started with Intermapper Flows

This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Datasheet

Intermapper Flows

Intermapper Flows is a tightly integrated component of Intermapper’s network monitoring, mapping, and alerting suite of tools.
Guide

Essentials for Privileged Access Management

Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide

Controlling SSH for Security and Compliance

SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...