Resources

Article

How Legacy Processing in IT Leads to Downtime on IBM i

Why haven’t IT processes kept pace with business changes? Why are you still suffering from downtime as the result of human error? Read this article to see how legacy processing methods are still leading to downtime today—and what you can do to stop it.
Article

Be in Control of Your ERP

Many ERP packages have built-in schedulers. However, these schedulers are typically not flexible or robust enough to meet the needs of even the smallest data center.
Article

IBM i Cloud Security Considerations

As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere. Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts: Regulatory...
Article

Lessons Learned from IBM's Native Scheduler

Your shop runs more than 30 jobs each day. Your jobs must communicate across IBM i and another OS. You need to monitor them and generate reports for audits or SLAs. Do your existing job schedulers really meet your needs?
Article

I Have All Object Authority And I’m Not Afraid To Use It!

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.