Resources

Blog

An IBM i Hacking Tale

Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
On-Demand Webinar

Building a Proactive Security Strategy

Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation. Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
On-Demand Webinar

Workshop: PowerHA + Robot HA

Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
On-Demand Webinar

Top 3 Reasons Why You’re Scared of Role Swaps

Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog

What Not to Do for IBM i Disaster Recovery

It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!