Resources

On-Demand Webinar

Top 10 Security Vulnerabilities on IBM i

IBM i is one of the most securable systems available—but unless you actually use the features IBM has provided, the system is vulnerable.
On-Demand Webinar

Go Paperless with Webdocs

Find out how to use Webdocs to easily capture, manage, and store paper and electronic documents, IBM i spooled files, emails, and even content generated from back-end business systems.
On-Demand Webinar

The Three Levels of AP Automation

Is your company ready to automate its AP processes? Which level will best meet your needs: simple, advanced, or full? Watch this presentation to learn how to choose the best fit for your company.
Article

iSeries Penetration Testing

Simple penetration tests help determine if a policy breach will be prevented and ensure that interested parties receive alert notifications. Failed tests might be indicative of a problem with product activation, or an incorrect or outdated Exit Point Manager IBM i rule set.