Datasheet
Sequel Data Access
Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
On-Demand Webinar
How to Do Business Intelligence—Without the Big Budget
You've been manually querying data for years, but keeping up with the status quo just isn't cutting it. Find out how to get better BI (at a price you can afford).
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
On-Demand Webinar
How to Deliver Useful Data Insights (Without Overloading IT)
Learn how to help your users help themselves to data insight.
On-Demand Webinar
Be the Data Access Hero—With Minimal Effort
Business users today want fast and easy data access—without waiting. You can be their hero. Watch the webinar to learn how.
On-Demand Webinar
How to Secure Data Access on IBM i
By Robin Tatam
Let Robin Tatam and Heath Kath show you how to provide IBM i data access to everyday users—without compromising security.
On-Demand Webinar
Don’t Just Settle for Query/400…
Watch this webinar to learn how you can get more out of your queries with a modern data access tool.
Article
Use Conditional Logic in Sequel Data Access to Convert Data into Meaningful Information
By Mike Stegeman on Thu, 03/30/2017
Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era.
A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that can be tricky.
If...
Blog
Turn Data into Information Your Business Needs
By Mike Stegeman on Thu, 03/30/2017
Data isn’t the same as information—but you can turn data into information. Learn how.
Sequel Web Interface
Need to access IBM i data from anywhere—not just your desk? Sequel Web Interface (SWI) makes it possible. With SWI, you can expand the use of Sequel Data Access across your organization—without maintaining any additional software. You’ll empower business users, executives, and IT alike to access important information on the go—without any hold-ups. ...
Article
Audit Tested & Audit Approved Instant Authority!
By Robin Tatam on Fri, 03/24/2017
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar
Stop Just Writing SQL Queries and Do More with Your Data
By Heath Kath
It’s time to go beyond SQL/400. Watch the webinar to learn how to analyze data and make smart business decisions quickly.
Guide
Controlling SSH for Security and Compliance
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Guide
Essentials for Privileged Access Management
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide
Our Privileged Access Management Solution - Your Sudo Replacement
Learn how to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce administration efforts with an effective privileged access management solution.
Article
Managing IT Access Privileges
Mon, 03/13/2017
THE UNSOLVED PROBLEM
Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges.
The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID...
Article
New Approaches to the SWIFT and PCI-DSS Framework
Mon, 03/13/2017
THE WORLD OF COMPLIANCE
At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate...