Blog
Three Layers of AP Automation—And How to Approach Them
Thu, 08/25/2016
Accounts payable departments run on documents—but documents don’t need to slow AP down. Read the article to learn more about AP automation.
Blog
Everything You Need to Know About Network Probes
By Kevin Jackson on Wed, 08/24/2016
What are probes, how do they work, and why are they so essential to network monitoring?
Blog
Modern RMM Tools for MSPs
Wed, 08/24/2016
Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?
Article
How Network Monitoring and Document Management Work Together
By Kevin Jackson on Wed, 08/24/2016
Maximize productivity and amp up your security by using network monitoring and document management solutions together.
Article
A Modern Approach to Performance Management
Wed, 08/24/2016
Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Article
Monitoring the Demands of Fast Disk
By Kurt Thomas on Wed, 08/24/2016
The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article
Small but MIGHTY: Controlling the *CLS Object Type
By Kurt Thomas on Wed, 08/24/2016
While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Article
Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i
By Robin Tatam on Sun, 08/21/2016
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
Managing Your IBM Enterprise with Halcyon
System administrators need more control and less complexity. This guide helps to identify the tools they need to be more effective at managing their enterprise.
Guide
Checklists for Checklists on Checklists... Why Not Automate?
The topic of this white paper is specifically around the advantages of automating one of the last bastions of manual, hands-on management—the operation and maintenance of IT platforms, systems, networks and architectures.
Guide
6 Recommendations for Smarter Spooled File Processing on your IBM i
Learn how to improve the flow of essential information around your organization, save costs, and free up your time.
Guide
IT Centralization and Robot
This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.
Article
How Intermapper Helps Businesses Stay Compliant
By Kevin Jackson on Fri, 08/19/2016
Keeping up with compliance regulations from governing bodies or your own internal team is essential to prevent security breaches and hefty fines. Learn how our network monitoring software can help keep your business compliant.
Blog
5 Steps to Streamline Your Network Monitoring Process
By Kevin Jackson on Fri, 08/19/2016
Learn five ways to maximize the efficiency of your network monitoring solution and streamline its implementation to make sure it's keeping your network as healthy as possible.
Guide
Building a Sound Investment Strategy Through Technology
Combining IBM Power Systems hardware and reliable iSeries job scheduler software is a powerful investment strategy for companies that not only improves their bottom line, but enhances customer experience.
Article
How to Achieve Optimal Network Performance
By Kevin Jackson on Fri, 08/19/2016
Learn three key tenets of network optimization and how a network monitoring software can assist in this task.