Resources

On-Demand Webinar

Security Best Practices for the IBM i Administrator

During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.
On-Demand Webinar

Promoting the Future of IBM i in Your Business

Yes "i" can! Get tips for selling your peers and executives on the low total cost of ownership of IBM i and enhance your organization’s strong heritage on the platform.
On-Demand Webinar

The Evolution of IBM i in the Data Center

AS/400, iSeries, IBM Power Systems—by any name, IBM i has stood the test of time. This proven technology continues to serve the needs of changing data centers around the world, but can its secrets of past success teach us what to expect next?
Case Study

Alaska Communications Reaches New Heights with Network Monitoring from Intermapper

Alaska Communications is an internet service provider (ISP) supporting communications infrastructure in Alaska. Their team provides critical network services to customers—oftentimes, in remote locations. The company was in the midst of developing plans for a new site—one which was located on a mountaintop. With this remote site, they knew they were in for an uphill battle regarding maintenance and...
Blog

What Is SIEM?

SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
On-Demand Webinar

IBM i in the Cloud

Wondering about your options for IBM i (iSeries, AS/400) in the cloud? Not sure if cloud is right for your organization? Get your answers from the experts here.
On-Demand Webinar

A CISO’s Take on IBM i Security

In this webinar, IBM i security expert Robin Tatam focuses on helping you change perceptions of IBM i at your organization and getting what you need from your management team.
On-Demand Webinar

Has My IBM i Been Breached?

If your manager asked you to determine whether your IBM i had been breached, what would you do?