Resources

Supercharge Your Modernised IBM i Screens with AI and discover a faster, smarter way to work with your IBM i data — all through a clean, browser-based interface. See Rocket® MX in action, including our new AI-powered chatbot that lets users ask plain-English questions right inside the application — and get real-time answers.
In this on-demand webinar, you will see how to create no-code/low-code RESTFUL APIs for the IBM i, using Rocket Software’s Rocket API product. The webinar showcases key benefits of using Rocket API, especially where programming resources are scarce and valuable business logic resides within the IBM i applications.
There is no shortage of information available about GDPR with a multitude of websites and white papers detailing and interpreting the specifics of the regulation.
Encryption, a form of cryptography, is an essential security measure for IBM i systems that adds a layer of protection against data breaches and exposure.
Learn more about how the functionality and affordability of today’s managed file transfer (MFT) solutions bring many benefits to companies of all size including helping businesses save significant staff time, reducing security exposures, meeting SLAs and even creating new competitive advantages.
Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.
Load more