Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

i5

RSS Feed    Add to Google    Add to My Yahoo!
i5 Reports
 
Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

PowerTech Easy Pass Saves Chisago County Time and Valuable Resources
sponsored by PowerTech
CASE STUDY: Chisago County needed a preventative measure to increase their level of AS/400 security and to eliminate the need for users to write down their passwords which posed a real security threat. They also needed a low maintenance solution. Enter PowerTech.
Posted: 16 Apr 2007 | Published: 02 Oct 2006

PowerTech

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Lights Out IBM i Automation
sponsored by CCSS
WHITE PAPER: This resource explains how you can achieve a partial, selective, and even full Lights Out Automation status in an IBM i environment. The benefits include: cost efficiency, elimination of human error incidence, and improved systems management.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

CCSS

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Lights Out in a Citrix Environment
sponsored by CCSS
WHITE PAPER: Access this essential resource to discover how QMessage Monitor, a message monitoring system, helped one organization complete critical processing tasks on time, eliminating the need for manual monitoring and avoiding costly downtime.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

CCSS

Podcast: Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
PODCAST: Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
i5 White Papers | i5 Multimedia | i5 IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement