Resources

Guide

Download "The Complete Guide to Securing IBM i Exit Points"

Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their impact on your security posture. One...
On-Demand Webinar

Automate Schedule - Best Practices

Follow these best practices for Automate Schedule and maximize the use of your job scheduling software and avoid common pitfalls.
On-Demand Webinar

Getting Started with IBM i Security: System Values

Security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. View this on-demand webinar to get guidance on their best practice settings.
On-Demand Webinar

Controlling Insider Threats on IBM i

Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Case Study

Baptist Health South Florida Streamlines Claims Processing with Automate

Background Baptist Health is South Florida's largest not-for-profit health care organization, encompassing seven major medical facilities and a number of outpatient centers. They utilize a health information system provided by Siemens called INVISION, and a claims management system from NDC Health called ePREMIS. The Challenge Effective claims processing and management is the name of the game in...