On-Demand Webinar
Drilldown Applications in Sequel Data Access
Learn how to leverage your Sequel software knowledge to unearth information gold and meet your unique business information needs.
On-Demand Webinar
Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i
By Rohit Mathur
The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them.
Watch our webinar...
Article
Content Intelligence: What Is It and Why Is It Important?
By Greg J. Schmidt on Fri, 02/18/2022
There are many different strategies a company can employ to help drive their organization to the next level. But why not use what you already have in your hands? Connect your content, documents, and information together to drive your business to the next level.
On-Demand Webinar
Scripting in Sequel Data Access Made Easy
Watch this webinar to learn tips and tricks on Scripts and Script Views from the software experts.
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
On-Demand Webinar
Make the Most of Sequel with Browser-Based Data Access
You already know and love the flexibility of Sequel Data Access. You can run queries on the fly, create top-notch reports, and build dashboards your users love.
On-Demand Webinar
Beyond the Basics: Object-Level Security on IBM i
By Robin Tatam
Watch this session to take a deep dive into object-level security with Robin Tatam.
Guide
Taking Back Control
In Taking Back Control: A Proactive Approach to Advance Your Security Maturity, learn why adhering to the motto “Prevent First, Detect Always,” is the best way to set and achieve the goals of security operations. Incorporating proactive efforts into your security strategy can serve as the first line of defense by providing significant obstacles that discourage attackers by making breaking in overly labor intensive.
On-Demand Webinar
Defending IBM i Against Cyber Attacks in Real Time
By Robin Tatam
IBM i security expert Robin Tatam discusses a new solution to bridge the gap between your enterprise SIEM solution and your IBM i servers.
Blog
Getting Started with PCI and Why Every Company Should Be in Compliance
By Robin Tatam on Mon, 01/24/2022
Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!
On-Demand Webinar
The Pro’s Guide to IBM i Security Fundamentals
By Robin Tatam
Watch this session to get clarity on three primary facets of IBM i security (and enhance your own career prospects in the process).
On-Demand Webinar
IBM i Security Trends and Threats to Watch in 2022
By Sandi Moore
IBM i security expert Sandi Moore looks into the future to identify key trends that are likely to drive cybersecurity conversations in the next 12 months.
Sequel Data Access
Flexible, simple, modern data access tool