Resources

Article

Eight Steps Toward a Secure Hybrid Cloud Environment

Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Article

With Public Cloud OS Instances Growing, Security Challenges Grow, Too

“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even with newer models for virtualization appearing on...
Article

Message Received?

When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.
Article

DB2 Field Procedures

DB2 Field Procedures were introduced in IBM i 7.1 to make encryption projects simpler. Read this article for details about how they work.