Datasheet
Robot Save
Robot Save provides automated backup, recovery, and encryption for IBM i. Schedule a demo today.
Datasheet
Powertech Encryption for IBM i
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Article
How to Download an ODBC Driver
Wed, 07/25/2018
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Article
FAQs about Performance Navigator
Thu, 07/12/2018
Will this product hurt the performance of my IBM i®?
You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service.
How is Performance Navigator compared to PM?
Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
Datasheet
Intermapper Remote Access
Intermapper Remote Access extends the reach of Intermapper by giving you and your staff access to maps, submaps, and configuration options, regardless of your location.
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Case Study
How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
cta_page
Find Sensitive IBM i Data in Need of Encryption
PCI, HIPAA, GLBA, Sarbanes Oxley, and state privacy laws put pressure on organizations to properly protect sensitive data, such as credit card numbers, Social Security numbers, and bank account numbers.
To provide the best protection for sensitive data stored on your system, you should seriously consider encryption. But first you need to find where this data is stored.
Find Database Fields ...
On-Demand Webinar
Stay Connected to Your Network with Remote Monitoring
Remote network access could simplify your life and help you improve uptime. Find out why and how in this on-demand webinar.
On-Demand Webinar
An Automated Recovery Plan Auditors Will Love
Boom. Disaster strikes. Now, it’s up to you to find the tape volume that contains the lost data and restore it quickly to the correct location. Luckily, recovering your IBM i data is easy with Robot Save.
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Blog
Compare Powertech Encryption for IBM i to IBM's Cryptographic APIs for Encrypting Database Fields
By Bob Luebbe on Fri, 03/17/2017
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.