Resources

On-Demand Webinar

Getting Started with IBM i Security: System Values

Security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. View this on-demand webinar to get guidance on their best practice settings.
On-Demand Webinar

Simplify Capacity Management

Watch this webinar to learn how to truly understand your systems and server capacity with simple but effective methods. Plan for future growth—even in your virtual environments.
On-Demand Webinar

Meeting GDPR Compliance with Robotic Process Automation

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018. Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...
On-Demand Webinar

Applying IBM i Security Guidance

This webinar covers debugging problems using the audit journal, determining what authority is required by profiles using the Authority Collection feature in V7R3, reducing the time of your Save Security Data using the Print Profile Internals command, and more.
Guide

Continuously Optimizing IT in Financial Terms

CHALLENGES: Virtualization and increasingly complex agile computing environments are creating difficulties for IT financial controllers and for IT Financial Management (ITFM). Virtualization breaks the long-standing direct, one-to-one correlation between cost-allocated physical hardware and the IT services it supports. Increasingly dynamic, multi-layered applications have made it more difficult...
On-Demand Webinar

Getting Started with Your Cloud Migration

You’ve decided to migrate to the cloud, but what migration strategy will keep your costs down and be most efficient? You have two main strategies for moving workloads to the cloud: Refactoring or Lift and Shift. Refactoring requires more time on the front end to optimize workloads prior to migrating. Lift and Shift moves eligible workloads right away,...
On-Demand Webinar

How to Improve Your Organization's IT Maturity

IT Maturity is often associated with increased efficiency and reduced risk, two forces that will drive valuable improvements. But without a full understanding of the business objectives and how IT needs to be aligned with those full optimization is not possible. The IT Service Optimization Maturity Model will allow you to gradually improve without losing track of any important aspect.
On-Demand Webinar

Q&A with a Capacity Management Expert, Part Two

Listen to this on-demand webinar to answer questions like: Is capacity management still relevant in the cloud? Why do large companies still struggle with capacity management? Does capacity management support or hinder DevOps?
Guide

Download "Childhood's End: Attackers Increasingly Take Aim at Linux Systems"

Like the wide-eyed humans who mistakenly trust their benevolent alien overlords in Arthur C. Clarke’s science-fiction classic, Linux users the world over are beginning to awaken to the reality that their malware- free utopian childhood is rapidly coming to an end. A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes since 2015 means the...
On-Demand Webinar

What is Capacity Management?

Capacity management is the practice of ensuring you have enough IT resources to meet business demands (without overspending). But your IT environment is a lot more complex than it used to be...
Guide

Download "IBM i Security and Integrity Monitoring Handbook"

Data breaches increase in number and severity every year. Putting barriers in place to stop attackers is an important part of any data protection plan, but barriers alone aren’t enough. Today’s top IT profressionals know that verifying the effectiveness of cybersecurity controls is critical. After all, most breaches go months before they’re discovered. Monitoring your security and regularly...