Fortra-05
Free
The IBM i is not on an impenetrable island all by itself commonly connected to many different facets of the business such as ERP applications, trading partners, and enterprise business intelligence systems. This increasing connectiveness, combined with the severity of today's threats, makes preventing and detecting suspicious activity more important than ever.
But what does that mean for a platform like the IBM i? And how would you go about doing that?
Watch this webinar and learn how to find and block intrusion attempts on the IBM i. We discuss:
You'll also learn how to control connections that threat actors typically use as well as manage event notifications and security alerts.
Free
Can you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are...
Free
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. Part 1 will teach you...
Free
Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1...
Free
IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and...