-
Alan Jordan |
Greg J. Schmidt
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this...
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Article
Top Three Reasons Mobile Data Access Will Be Your Savior
Tue, 11/22/2022
In today’s business world, you need data access beyond the green screen and GUI. Read this article to learn how mobile data access in a friendly browser interface will save you.
On-Demand Webinar
Trusty Host Reports and Flashy Client Reports: Get to Know Them Both
Watch now for an informative webinar where Sequel experts will discuss when to use either a host report or client report and the benefits of both.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Blog
What’s So Great About Analyzing Data in Microsoft Excel?
Thu, 07/21/2022
Find out the pros and cons of using Excel to analyze your organization’s data.
On-Demand Webinar
Modernize Business Intelligence in 2023
Watch this webinar to see how Sequel software makes your transition to modern data access and analysis from Query/400 simple.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.
Learn how a proactive cybersecurity program can be a game changer for an organisation's success through...
On-Demand Webinar
Getting the Most from Variables in Sequel
Watch this webinar to see how variables can add flexibility to your views, reports, tables and scripts to prompt for criteria at runtime.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Drilldown Applications in Sequel Data Access
Learn how to leverage your Sequel software knowledge to unearth information gold and meet your unique business information needs.
On-Demand Webinar
Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i
By Rohit Mathur
The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them...
Datasheet
Fortra's Security & Automation Portfolios
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that...
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Scripting in Sequel Data Access Made Easy
Watch this webinar to learn tips and tricks on Scripts and Script Views from the software experts.
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.