Resources & Events
Your Biggest Challenge to IBM i User Onboarding
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
The Road To Security Starts with a Security Scan
Sometimes, there are known vulnerabilities that clearly need to be mitigated as soon as possible—such as application users running with *ALLOBJ special authority. But, often there isn’t a thorough understanding of what’s wrong with a server’s configuration or what should be addressed first.
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.
2019 IBM i Security Tour - Seattle
Experts acknowledge that security and compliance are among the most important corporate initiatives today, affecting every facet of business. Back by popular demand, join IBM i security expert, Robin Tatam, on his mission to provide clarity and guidance around cybersecurity and how it relates to Power Systems.
IBM AIX 3rd Annual Community Survey Results Revealed
Attend this live webinar to find out the results of the IBM AIX 3rd Annual Community Survey , learn how AIX is being used, and the role it will play for IT leaders in the coming years.
The "Easy" Button for Provisioning IBM i Users
Provisioning new user profiles with appropriate authorities is a challenging task—especially when doing so over multiple systems or with a large number of users. In this recorded webinar, learn how to save time on profile administration and reduce the risks of special authorities.