Resources

Blog

An IBM i Hacking Tale

Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
On-Demand Webinar

Deploy Robot Automation Dashboards with Sequel

Sequel Data Access isn’t just for compiling sales numbers or creating easy-to-read dashboards. It’s perfectly equipped to compile real-time performance indicators using a detailed operations history from your Robot products.  Track results from Robot Schedule, Robot Save, and Robot Console through automated, graphical dashboards, such as: Number of Robot Schedule jobs run,...