Resources

On-Demand Webinar

5 Myths About Encryption on IBM i

In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar

Panel Discussion: Your IBM i Security Action Plan

When your to-do list is a mile long, security might not bubble to the top—unless and until something catastrophic happens. But dealing with a cybersecurity catastrophe is far more time-consuming (and expensive) than a proactive approach. Join the Fortra team of IBM i security experts for a discussion geared to help you take concrete steps toward improving your IBM i security posture. They’ll cover...
On-Demand Webinar

Encryption on IBM i Simplified

DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
On-Demand Webinar

IBM i Solution Edition Program Explained

When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
On-Demand Webinar

IBM AIX 4th Annual Community Survey Results Revealed

In 1986, IBM launched AIX®, its open standards-based UNIX operating system. Now, more than 30 years later, this popular platform runs on IBM POWER® servers and supports critical applications for organizations around the world. With such a strong presence in IT environments, AIX and its specific usage is of great interest to IT experts as they evaluate their own technology ecosystems in light of...
On-Demand Webinar

Security Best Practices for the IBM i Administrator

During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.