Resources

Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Article

How Intermapper Helps Businesses Stay Compliant

Keeping up with compliance regulations from governing bodies or your own internal team is essential to prevent security breaches and hefty fines. Learn how our network monitoring software can help keep your business compliant.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Article

How Banks Leverage Big Data for Big Value

Technology professionals in the banking industry face a wide range of concerns due to the nature of the data stored within their systems. The potential reward in stealing or compromising financial data makes these organizations a prime target for cybercrime, while stringent industry regulations require security to be extremely tight at all times. Is it possible to strike a balance between defensive, regulatory, and data access needs and still provide access to data for analytics without compromising the security of the entire system? The truth is that many organizations in the financial sector have deployed analytics technology while being able to keep their security tight, and are benefiting from it.
Article

High Availability and Your Enterprise Job Streams

The concept of high availability has been on the minds of IT decision makers in the last several years. As the recent IBM Top Concerns survey revealed, comprehensive high availability is the second highest concern among IBM i users, with only keeping current skill sets coming ahead.
Article

Get a Handle on Your Job Stream with Forecasting

A Robot Schedule forecast shows you the run activity scheduled for all Robot Schedule jobs over a time period that you specify. Robot Schedule uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups to make its forecast.
Article

On the Trail of IBM i Audit Data

Believe it or not, auditors are your friends, but audit reporting might be your worst enemy. Gathering all that data can take ages, unless you’ve already keeping automated audit trails across your operations.
Article

Robot and FlashCopy

Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i . Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Article

Add Power to SEQUEL Scripts with Logic

SEQUEL Scripting is a process that allows users to run multiple SEQUEL and system commands together. Scripts allow for much of the same capability of Command Language Programs (CLP) without the need for programming knowledge or a compiling of the objects.
Article

Dealing with Temporary Files in WebDocs iSeries

WebDocs iSeries uses the IFS directory /RJSTEMP and the library RJSTEMP to store information and files temporarily. In general, it will attempt to clean up after itself, but there are situations which arise that do not perform clean up operations. As a result, files will gradually accumulate, taking up disk that could otherwise be used for other processes. The RJSTEMP library The RJSTEMP isn’t...