Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

980 Resource Pages Available
Article
By on February 25th, 2017

We compared two network monitoring heavyweights: What's Up Gold and Intermapper. Which solution reigned supreme?

Compare two top-of-the-line network monitoring solutions
Article
By on February 25th, 2017

Network monitoring software does not have to be overly complex to configure and operate. Intermapper is easy to use and gives you all the network analysis features you need at an affordable price.

Why ease-of-use is critical for network monitoring
Article
By on February 24th, 2017

As more applications on IBM i become Java- or web-based, they’re less likely to send their important messages to a message queue. But don’t worry—Robot Console has that covered.

Available
On
Demand

iForms customers: learn about what’s new and why you should upgrade to the most recent version.

Available
On
Demand

Need to replace AFP forms? Find out what to look for in an electronic forms replacement and how to get started.

Article
By on February 24th, 2017

Unfortunately, most companies emphasize the protection of data through disaster recovery and high availability planning, and they don’t put the necessary controls in place to ensure that day-to-day use of the data is appropriate and authorized.

Article
By on February 24th, 2017

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.

Article
By on February 24th, 2017

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.

Article
By on February 24th, 2017

Okay, I confess; it’s not that you shouldn’t worry about hackers, but you need to realize and acknowledge that IBM i servers face an even more likely threat: one that’s already infiltrated the advanced firewall, has engineered the capability to access critical business data, and has operating without detection for years.

Guide

Protecting sensitive corporate information and meeting compliance requirements aren’t the only reasons your organization needs a security policy. A well-defined policy can make the difference between maintaining the trust of customers, vendors, and employees—or facing the damaging consequences of a data breach.

Article
By on February 24th, 2017

Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!

Article
By on February 24th, 2017

World-renouned security expert Carol Woodbury provides suggestions for ways you can "spruce up" your security configuration.

Article
By on February 24th, 2017

You know you need to do something about IBM i security. But what? These three questions will guide you.

Article
By on February 24th, 2017

Bring-your-own-device policies have remade enterprise IT in the last decade, as professionals have been empowered to use their own smartphones, tablets, and laptops to work with company data. But organizations have to be smart about BYOD, because the practice can also amplify risks to company assets.

Available
On
Demand

Automate’s data extraction capabilities allow you to read, write, and update a wide variety of data sources automatically. Watch this webinar to learn how you can save time on data-driven processes.

Available
On
Demand

Stop printing and delivering paper reports! Watch this webinar to learn how you can eliminate paper and reduce costs by automating your report and document delivery processes.

Available
On
Demand

It’s time to re-think your reports. Watch the webinar to learn how to modernize report capture, management, and delivery for Windows and IBM i.

Available
On
Demand

Looking for an easy way to catch up with HelpSystems and hear how the new features in Robot may benefit you and your company? Here’s your chance!

Article
By on February 23rd, 2017

Learn how network topology mappers simplify and speed up troubleshooting for IT teams.

Available
On
Demand

There’s no denying the fact that the IBM i workforce is aging and many are retiring. Are you prepared to handle the impact? Tom Huntington heads a panel of IBM i automation and security experts who will show you the way to future-proof your processes.

Available
On
Demand

Not all IBM i experts are created equal. Programmers, developers, operators, and system administrators each have a specific skillset that keeps your business running smoothly. When one resource retires, don't burden another with the additional workload. Think long-term and look to automation instead.

Stay up to date on what matters.