Resources

Datasheet

Sequel Data Access

Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.   ...
Guide

Which IBM i Data Access Tool is Right for You?

Data access software is essential today to both technical users—like your IT team—and business users—like everyone else. Query/400 has long been the go-to for IBM i data access. It’s been around for over 30 years, but the tool hasn’t advanced with changes in technology. That’s where modern data access tools like Sequel have the advantage. But how do you really know which data...
Article

Use Conditional Logic in Sequel Data Access to Convert Data into Meaningful Information

Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era. A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that...
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.