Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Network monitoring is only half the answer. Find out how to automatically fix failures, spikes, or slowdowns when you leverage the power of automation.
Intermapper creates some of the best dynamic visual maps out there, while still giving you monitoring and alerting in one easy-to-use network mapping tool.
Modernize your RPG source code with the most up-to-date syntax and style available for your IBM i release with the RPG Conversion Wizard.
You can perform four types of conversions through RPG Toolbox:
Convert RPG III and RPG/400 source code to modernized RPG IV syntax
Update existing RPG IV source code to take advantage of modern syntax
Convert RPG IV fixed-format Calculation spec...
Network mapping software give you visibility into network connections, performance issues, and unusual traffic spikes but what is the right tool for you: paid or free?
If you need proactive network monitoring and visual mapping, Intermapper will give you real-time knowledge of your network, affordably and with seamless integration into Splunk.