Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 1 - 20 of 20 for
Content types: Live Webinar X
Jun
27
Live Webinar

Looking for an easy way to catch up with HelpSystems and hear how the new features in Halcyon may benefit you and your company? Here’s your chance!

Jun
27
Live Webinar

Join this webinar for expert tips on using the integrated IBM i audit journal.

Jun
28
Live Webinar

HelpSystems has been helping organizations automate with software robots for over thirty years. Join the live webinar for an introduction to our comprehensive suite of enterprise automation products: Automate Complete.

Jun
29
Live Webinar

Take a guided tour of Intermapper's features and benefits, including a live product demonstration.

Jun
29
Live Webinar

Join Robin Tatam and Heath Kath to find out how to provide IBM i data access to everyday users—without compromising security.

Jul
6
Live Webinar

In this session, Carol Woodbury will first describe the basic use of the integrated IBM i audit journal. Then she’ll describe how she and the HelpSystems Professional Security Services team use the IBM i audit journal to help clients discover things about their system that they didn’t know previously, such as who or what processes are accessing specific objects. She will then provide examples of the information provided by the new audit journal features added to V7R2 and V7R3, including the network values and new fields in the profile entries.

Jul
6
Live Webinar

Take a guided tour of Intermapper's features and benefits, including a live product demonstration.

Jul
6
Live Webinar

Set the tone for data protection with security-relevant system values in this live webinar with IBM i security expert, Carol Woodbury.

Jul
12
Live Webinar

Whether you want to monitor mobile devices, smart boards, or radio towers, Intermapper can monitor anything with an IP address.

Jul
12
Live Webinar

When your core IBM i application could be going down, don’t be the last to know. Register today and learn how Robot has application monitoring covered.

Jul
13
Live Webinar

You've got data on IBM i. But veryone wants to see it in Microsoft Excel. Find out how to get the best of both worlds.

Jul
13
Live Webinar

The explosion of technology-centric breaches has helped elevate security and compliance to a leading IT initiative. Here’s your chance to catch up with HelpSystems and learn about new ways we can help you and your company meet today’s cybersecurity challenges.

Jul
18
Live Webinar

Attend this webinar to learn what to look for in a replacement for AFP utilities.

Jul
19
Live Webinar

In this live event, Robin Tatam will explain why event auditing is essential to IBM i security and how to configure it with one simple command.

Jul
20
Live Webinar

Are there still companies that use AS400? Of course! IBM i was built on the same foundation. Join this live webinar to hear Steve Will talk about the future of this powerful platform.

Jul
27
Live Webinar

It’s time to manage your workload smarter, not harder. Don't miss IBMer Dawn May as she dishes the dirt on how to get the best performance out of your IBM i workload. Register today!

Aug
3
Live Webinar

Users have access to sensitive data through well-known services like FTP and ODBC. Learn how to secure your system from unauthorized access in this live event with Robin Tatam.

Aug
17
Live Webinar

What is a privileged user? Get up to speed with IBM i security expert Robin Tatam on special authorities, command line access, and auditing user activities.

Aug
31
Live Webinar

What is the IFS and why is securing it so important? IBM i security expert Sandi Moore will explain how you can avoid the most common IFS security mistakes.

Sep
14
Live Webinar

Join Carol Woodbury as she explains public authority (*PUBLIC), how this unique IBM .i concept works, and why default authority values constitute a security gap.

Stay up to date on what matters.