Resources

Article

Generate and Distribute Audit Reports Automatically

Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.
Article

Windows Azure Automation

Cloud computing, cloud storage, cloud database…we all have heard about the “cloud.” Cloud computing has gained tremendous visibility in recent years. According to research firm, Gartner, “By 2012, 80% of Fortune 1000 enterprises will be using some cloud computing services, 20% of business will own no IT assets.” In addition, small businesses are attracted to the small startup costs and lower TCO...
Article

Benefits of Web Server Management Console

Just like the desktop version of SMC, the Web SMC is a web-based interface for centralized management and administration, and allows you to graphically manage all elements of the Automate BPA Server including workflows, the Repository, users and agents. You can also access reports and calendars as well as configuring system settings and options.
Article

Working with Agent Groups in BPA Server

An Agent Group is a distinct Automate BPA Server object that contains one or more Agents within a logical group. They can be used as workflow objects in place of individual Agents to distribute conditions and tasks to multiple machines across an enterprise. The use of Agent Groups can be more convenient in situations where multiple agents need to be selected for automated execution. Instead of...
Article

Data Store Migration Utility

Data migration is the process of transferring data from one hardware or software configuration to another. It can be a standard yet crucial element of IT operations, allowing organizations the ability to maintain the integrity of important data while moving forward to face constantly changing technologies. The downside being that data migration is often times consuming and causes major disruptions as a result of downtime or application performance problems.
Article

Using Automate to Perform Desktop Interactions

Automate includes numerous interactivity related actions that can impersonate any mouse or keyboard activity as well as virtually any form of desktop interactions performed manually. This article will describe some of the more commonly used Interactivity actions and how they are used to navigate and interact with interfaces as well as supply possible solutions to some frequent interactivity and navigation related problems.