Blog
Modern RMM Tools for MSPs
Wed, 08/24/2016
Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?
Article
A Modern Approach to Performance Management
Wed, 08/24/2016
Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
6 Recommendations for Smarter Spooled File Processing on your IBM i
Learn how to improve the flow of essential information around your organization, save costs, and free up your time.
Guide
Checklists for Checklists on Checklists... Why Not Automate?
The topic of this white paper is specifically around the advantages of automating one of the last bastions of manual, hands-on management—the operation and maintenance of IT platforms, systems, networks and architectures.
Guide
Managing Your IBM Enterprise with Halcyon
System administrators need more control and less complexity. This guide helps to identify the tools they need to be more effective at managing their enterprise.
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Effective Log Management
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide
Two Factor Authentication for IBM i
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Blog
“Confessions” of a CIO: How to Tackle the Toughest Business Challenges
Tue, 08/16/2016
A new book on CIOs should put ‘the cat among the pigeons’ and create some interesting debate amongst IT professionals, particularly about risk taking and tough management decisions.
Press Release
HelpSystems (now Fortra) Fills Encryption Gap With Linoma Buy
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
Blog
Say Goodbye to Document Mismanagement
Thu, 07/28/2016
We write a lot on this blog about document management, but this time we wanted to share a graphic illustrating the struggles that some companies and individuals still face in their processes.
Can you see yourself (or your company) in any of these stats? If so, let us help you find a solution!
With RJS, your company can digitize...
cta_page
System and Performance Monitoring ROI Calculator
Does proactive monitoring really matter?
You bet. On average, businesses are losing $5,600 for every minute of unplanned network downtime (Gartner). That’s well over $300K every hour. How long does it take your IT team to find and fix issues?
The issue that grinds your business to a halt could be on the network or buried in an application log. It could be a problem with performance, a file event...