Resources

Join us for an insightful discussion and demonstration of how IBMi modernisations solutions from Rocket Software work together to accelerate modernisation, streamline integration, and optimise software development for IBM i environments.
There is no shortage of information available about GDPR with a multitude of websites and white papers detailing and interpreting the specifics of the regulation.
Encryption, a form of cryptography, is an essential security measure for IBM i systems that adds a layer of protection against data breaches and exposure.
Learn more about how the functionality and affordability of today’s managed file transfer (MFT) solutions bring many benefits to companies of all size including helping businesses save significant staff time, reducing security exposures, meeting SLAs and even creating new competitive advantages.
Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.