The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from.

>> Review the list of On-demand Webcasts offerings below.
>> Select the items you would like to receive.
>> Provide your email address at the bottom of the page and submit.
>> Your selection(s) will be sent to you without cost or obligation.
>> All information must be submitted in English.


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


PowerTech

 

In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.

There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?

Join IBM i security expert Sandi Moore as she outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.

Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Sandi Moore will show you how to achieve them.


(return to top).

HelpSystems

 

Everyone wants a piece of your business data. But keeping up with data access requests in the era of constantly growing data is a challenge. As a result, your IT department can be overwhelmed, inundated, and constantly needing to play catch-up.
It’s time to develop a strategy that will help you meet your informational challenges head-on. Watch the webinar to learn how to set your IT department up for business intelligence success in 2018.
You’ll learn how the right data access tool will help you:

  • Access IBM i data faster
  • Deliver useful information to executives and business users
  • Empower users with secure data access
Ready to make your game plan and finally keep up with your data access requests?


(return to top).

PowerTech

 

Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials.
That compromise can originate from user carelessness, or from or from password interception by a hacker-installed key logger, or via a data breach at an unrelated information provider, where the user reused their password for the sake of convenience.
MFA gives you the power to eliminate these vulnerabilities.
This fact is not lost on regulatory bodies like PCI, who are painfully aware of risks associated with single-factor authentication.
In this webinar, security expert Sandi Moore explains why more and more IBM i organizations are implementing MFA. She discusses:

  • Authentication factors, such as hardware tokens, SMS messages, smartphone apps, and biometrics
  • The strengths and weaknesses of each factor type
  • How to deploy MFA across your IBM i environment
Sandi also introduces an IBM i solution that provides access from multiple entry points,
including green screen and desktop, and reports on all access attempts.


(return to top).

PowerTech

 

As cyber threats become more sophisticated, strong encryption is essential. DB2 Field Procedures (FieldProcs) can greatly simplify encryption on IBM i, yet most organizations are not yet utilizing this powerful feature.
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
IBM i security expert Sandi Moore shows you how you can automate encryption and decryption, why disk encryption is no substitute for database encryption, and important factors to consider when looking at an encryption solution.
If you're concerned with protecting your sensitive IBM i data, you don't want to miss this session!


(return to top).

Profound Logic Software, Inc.

 

Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic.

We will demonstrate how Profound UI:
  • Goes beyond simple screen-scraping to truly modernize your RPG applications
  • Uses RPG Open Access and your own RPG code and development talent to modernize
  • Supports rapid development with an easy-to-use, drag-and-drop Designer
  • Integrates with our on-the-fly modernization, mobile development, and Enterprise Modernization solutions

(return to top).

HelpSystems

 

Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.
Watch noted security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on.


(return to top).

PowerTech

 

Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim.
But these attacks are also a chance to learn from others’ mistakes. What underlying vulnerabilities were overlooked and how can your organization avoid making similar mistakes?
IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
Join this webinar to learn about the biggest errors made when securing a Power Systems server.
This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA.


(return to top).

HelpSystems

 

True or False: The IBM i operating system is just the AS/400 all over again. False! The AS/400 provided a solid foundation, but it has evolved over the years into the entirely new technology that we call IBM i. The 2020 chapter in our journey from AS/400 to IBM i includes new cloud offerings, new

Technology Refreshes, new customers, and a strong roadmap. How do these additions make the platform more powerful?
Back by popular demand, IBM i Chief Architect Steve Will joins IBM Power Champion Tom Huntington to share a unique perspective on the direction of this platform, including:

  • IBM i development strategies in progress at IBM
  • Ways that IBM i fits into your cloud strategy
  • Key takeaways from the AS/400 days
IBM i stands on the shoulders of giants. Its heritage and strategic innovation point to a bright future for this strategic server that continues to support organizations in every industry around the world.
Don’t miss a moment as the saga unfolds—watch now!


(return to top).

PowerTech

 

DB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.

Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

  • Use Field Procedures to automate encryption and decryption
  • Restrict and mask field level access by user or group
  • Meet compliance requirements with effective key management and audit trails
In the webinar, you’ll see our Powertech Encryption for IBM i solution. Powertech Encryption will automatically create and manage the FieldProcs needed for encrypting your database fields. Powertech Encryption also includes the security controls, key management, and detailed logging needed to pass audits and meet privacy regulations.

There is no better time to encrypt sensitive data on your IBM i. Watch the webinar today!


(return to top).

PowerTech

 

Data breaches like Equifax and Capital One have once again raised the specter of compliance mandates: those abstract rules and confusing regulations that levy eye-popping fines for cybersecurity missteps.
IT teams are on the front lines, tasked with maintaining system configurations that will pass an audit—but few mandates are written for a technical audience. Laws like HIPAA, SOX, and GDPR give us a general sense of what outcome we need to achieve, but they’re far from an instruction manual or roadmap.
IBM i raises unique considerations because few auditors know what to look for on this open but highly securable OS, and most admins are unfamiliar with regulations and security best practices.
In this webinar, IBM Champion Robin Tatam and security expert Sandi Moore team up to help you decode common requirements and build a roadmap to compliance. Watch this session to learn:

  • What all compliance mandates have in common
  • How to translate mandates into actionable items
  • How to speak your auditor’s language
  • Strategies for getting (and staying) compliant on IBM i
  • Why regulations aren’t the only reasons to care about security


(return to top).

PowerTech

 

It’s time to set the record straight about encryption on IBM i.
In fact, the latest IBM i Marketplace Survey shows that many IBM i organizations have no plans to implement database encryption. When you consider all the ways strong encryption could avert a data breach disaster, this is quite a surprising result.
In this webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i. She’ll also give you a peek at our Powertech Encryption solution that makes database encryption easier, faster, and more secure than other options on the market.
If you’re concerned with protecting your IBM i data, you don’t want to miss this event.


(return to top).

PowerTech

 

Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses?
The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details.
In this on-demand webinar, IBM i security expert Sandi Moore and Chuck Losinski illustrate specific ways you can improve your security posture and stop an attacker in his tracks. They compare systems that have implemented best-practice security measures with systems that haven’t.
You’ll learn what can happen when:

  • Users can connect through FTP without restrictions
  • System values are incorrectly set
  • Users carry excessive privileges
This educational presentation is sure to help you look at IBM i security in a new light—and make changes that improve your odds of surviving a cyber attack.


(return to top).

PowerTech

 

A growing number of compliance mandates require sensitive data to be encrypted, from the EU’s GDPR to New York’s cybersecurity law. PCI DSS goes a step further by detailing how encryption keys must be stored.
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity.
But what kind of encryption solution will satisfy an auditor (they’re not all created equal!) and how can you implement encryption on IBM i?
Watch this on-demand webinar with renowned security expert Robin Tatam to find out how to meet today’s most common encryption requirements on IBM i. You’ll also learn:

  • Why disk encryption isn’t enough
  • What sets strong encryption apart from other solutions
  • Important considerations before implementing encryption
You’ll also get a quick peek at our Powertech Encryption for IBM i product that makes IBM i database encryption easier, faster, and more secure than other options on the market.


(return to top).

HelpSystems

 

Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
Watch the recorded webinar to see how Sequel:

  • Makes creating complex results simple
  • Eliminates barriers to data sources
  • Increases flexibility with data usage and distribution
Accelerated productivity makes everyone happy, from programmer to business user.


(return to top).

PowerTech

 

Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
In the second of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:

  • Object ownership
  • Adopted authority
  • Public and private authorities
  • Command line permission
  • Client-server considerations

(return to top).

Profound Logic Software, Inc.

 

Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.

In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).


(return to top).

PowerTech

 

Malicious programs can bring entire businesses to their knees—and IBM i shops are not immune. Imagine what would happen to your organization if users couldn’t process orders, accept payments, access customer lists, or any number of day-to-day activities.
Despite the rise in crippling malware and ransomware attacks over the past year, many Power Systems owners still don’t see viruses as a risk because they consider them to only be a Windows threat.
It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

  • Viruses, native objects, and the integrated file system (IFS)
  • Power Systems and Windows-based viruses and malware
  • PC-based anti-virus scanning versus native IBM i scanning
There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.


(return to top).

PowerTech

 

Unfortunately this is fiction.

In this webinar, Robin Tatam explores a well-documented IBM i breach. Despite the many options IBM has provided to protect the system and data, many organizations still struggle to apply appropriate security controls. Protecting the system and the data residing on it requires action. Robin describes the steps you can take to avoid the mistakes made in this specific case as well as other configurations that can lead to business disruption due to inadequate or misconfigured security settings.
One FACT is that IBM i is secure-able.


(return to top).

Core Security

 

With so many organizations depending on AIX day to day, ensuring proper security and configuration is critical to ensure the safety of your environment. Don’t let common threats put your critical AIX servers at risk. Avoid simple mistakes and start to build a long-term plan with this AIX Security eCourse. Enroll today to get easy to follow instructions on topics like:

  • Removing extraneous files
  • Patching systems efficiently
  • Setting and validating permissions
  • Managing service considerations
  • Getting overall visibility into your networks


(return to top).

PowerTech

 

Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
In this webinar, IBM i security expert and IBM Champion Robin Tatam explores cyber attacks on IBM i. You'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

  • Learn which security gaps cyber criminals love most
  • Find out how other IBM i organizations have fallen victim
  • Get the details on policies and processes you can implement to protect your organization, even when staff works from home
Robin will describe the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.


(return to top).

PowerTech

 

Modern interfaces like FTP and ODBC completely bypass menu security, often allowing end users and even attackers to view, update, and delete data in the database without the restrictions and auditing supplied by the application.
Unfortunately, the vast majority of IBM i organizations still rely on menu security to protect their data. Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.
Join this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. IBM i security expert Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.
You’ll also see how one organization was targeted through FTP and learn how they implemented policies that restrict access to only those users who need it.


(return to top).

Profound Logic Software, Inc.

 

In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily adopt Node.js in your business, and to take advantage of the many benefits of Node, including access to a much larger pool of developers for IBM i and access to countless reusable open source code packages on npm (Node Package Manager).
You will see how Profound.js 2.0 allows you to:

  • Provide RPG-like capabilities for server-side JavaScript.
  • Easily create web and mobile application interfaces for Node on IBM i.
  • Let existing RPG programs call Node.js modules directly, and vice versa.
  • Automatically generate code for Node.js.
  • Automatically converts existing RPGLE code into clean, simplified Node.js code.
Fill out the form on the right to watch!


(return to top).

PowerTech

 

All Object (*ALLOBJ) special authority is probably the best-known and most feared authority in the IBM i community. This “root” access is unrestricted authority to every object on the system—and users love it! Who wouldn’t want an all-access pass to the data and applications you need to get your job done?

But there’s a dark side to *ALLOBJ. A master key to read, change, and delete any object on the system creates a frightening opportunity for abuse. 25 percent of data breaches involve insiders—and many studies suggest that number may be much higher. What many don’t realize is that these breaches are often unintentional.
That’s right—your users with *ALLOBJ could be perfectly trustworthy and still cause a data breach.
In this live webinar, security expert and IBM Champion Robin Tatam explores:

  • Best practices for All Object authority (and data around what IBM i orgs are actually doing)
  • Strategies for correcting this vulnerability—without reducing productivity
  • Several other ways IBM i users gain elevated privileges
You’ll learn simple changes you can make to improve system security and reduce the odds of a breach. Robin will also introduce an automated solution that balances your organization’s need for security and efficiency.


(return to top).

PowerTech

 

Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:

  • Object ownership
  • Adopted authority
  • Public and private authorities
  • Command line permission
  • Client-server considerations

(return to top).

HelpSystems

 

The new POWER9 servers offer over two times more per-core capacity than POWER7+ servers, but is that what your business needs?
When it’s time for hardware change, it pays to plan ahead.
Within this webinar, you’ll learn why capacity planning on IBM i is more important now than ever before. You’ll also see a live demo of Performance Navigator—the leading tool for capacity planning on IBM i—and learn how combining the software with our capacity planning service engagement can help you:

  • Centralize years of historical performance data
  • Graph out the current performance status for each LPAR
  • Model peak historical workload days based on multiple “what-if” scenarios
  • Develop a cost-justification deliverable to share with decision makers
It’s time to eliminate the guesswork and size your Power Systems servers with confidence.


(return to top).

PowerTech

 

Can you trust all of your users all of the time?
A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six month later.
A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime.
In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • How phishing attacks are becoming more sophisticated
  • Three little-known ways malicious programs can reach your IFS
  • Why the IFS is IBM i’s “Typhoid Mary”
You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.


(return to top).

PowerTech

 

The use of encrypted sessions is both an effective way to prevent credential theft, as well as a requirement for numerous laws and regulations.
In this session, security expert Robin Tatam shows you how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.
This webinar will include an example of using your IBM i as a CA (Certificate Authority). You’ll also see an example of creating a request to send to a well-known CA to create the digital certificate you’ll need to assign to the servers to enable encrypted communications.


(return to top).

Profound Logic Software, Inc.

 

Join us for this hour-long webcast that will explore:

  • The danger legacy code poses to the business – especially in the age of COVID
  • Why re-writes can cause more trouble than you think
  • How an automated and flexible approach to code transformation mitigates these risks
  • Why Node.js is the ideal language for business success.
There’s no magic solution to reducing risk… but with careful planning and partnership, a flexible and automated approach, and the right programming language, it might feel that way!


(return to top).

HelpSystems

 

High availability for IBM i has been a hot topic in 2017, jumping 20% from our 2016 survey to take the #2 seat on IT priority lists just behind cybersecurity. And no surprise with these two topics so closely tied to your most valuable asset: your irreplaceable business data.
With major airline outages last year and the recent ransomware attacks, you must be asking yourself: am I doing everything I can to protect my organization’s data?
Tune in as our panel of IBM i high availability experts—Tom Huntington, Matt Staddler, and Cole Ragland—deliver lively discussion around the top high availability issues of today, including:

  • Why companies don’t test role swaps when they know they should
  • Whether high availability in the cloud makes sense for IBM i users
  • Why some organizations don’t have high availability yet
  • How to get high availability up and running at your organization
  • High availability considerations for today’s security concerns
There are no do-overs when it comes to your data. Once it’s gone, it’s gone...unless you have a data replication layer in place to protect it. Learn the value of these strategic solutions and how you can implement them in a hurry—watch now!


(return to top).

PowerTech

 

Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.
In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.
Robin will cover:

  • Reducing the risk posed by special authorities
  • Establishing object-level security
  • Overseeing user actions and data access
If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.


(return to top).

Profound Logic Software, Inc.

 

Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here.
In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control.
Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform.
Attend this webinar to learn:

  • Different tools to develop Node.js applications on IBM i
  • Debugging Node.js
  • The basics of Git and tools to help those new to it
  • Using NodeRun.com as a pre-built development environment


(return to top).

PowerTech

 

You would think that a server hosting mission-critical applications and data would get the most security attention, right? Unfortunately, that is rarely the case with IBM i.
While Security Information and Event Management (SIEM) solutions are an established way to meet compliance mandates and stay on top of suspicious activity, most enterprise SIEM solutions offer little to no coverage for IBM i servers. This means that event data—if even collected—sits abandoned and ignored.
In this webinar, IBM i security expert Robin Tatam discusses a new solution to bridge the gap between your enterprise SIEM solution and your IBM i servers. You’ll learn:

  • How to begin security auditing on IBM i without generating enormous quantities of data
  • 3 common mistakes that IBM i people make when auditing
  • Why regulations state that access monitoring is essential
  • Dangerous events that your audit data may be missing
  • How Powertech SIEM Agent can help identify security threats on IBM i


(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 


Interested in IBM Power System White Papers, Webcasts or Software solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center