The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from.

>> Review the list of On-demand Webcasts offerings below.
>> Select the items you would like to receive.
>> Provide your email address at the bottom of the page and submit.
>> Your selection(s) will be sent to you without cost or obligation.
>> All information must be submitted in English.


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


PowerTech

 

Now that we’ve closed the books on another tumultuous year in cybersecurity, what should IBM i pros be watching for in 2022?
Join IBM i security expert Sandi Moore as she looks into the future to identify key trends that are likely to drive cybersecurity conversations in the next 12 months. Highlights include:

  • The explosion in cyber crime
  • Evolving cyber insurance requirements
  • The long-term impact of a hybrid workforce
IT environments aren’t getting any simpler and attackers learn new tricks every day. But more organizations are waking up to the business impact of cybersecurity. If you want to set your IBM i systems up for success in the new year, you don’t want to miss this session!


(return to top).

HelpSystems

 

The annual IBM i Marketplace Survey provides a close look at how organizations running IBM i are using the IBM Power hardware and the operating system.
Watch this webinar where we reveal the results of the 2022 survey. You’ll also gain exclusive insights from a panel of IBM i technology experts on year-over-year trends and data points, including:

  • What are the biggest challenges presented by an increasing remote workforce?
  • Are more organizations adopting IBM i in the cloud?
  • What does the IBM i development scene look like?
  • Are shops expanding their IBM i usage?
  • How does IBM i’s ROI compare to other servers?

(return to top).

PowerTech

 

IT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i.

In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.


(return to top).

PowerTech

 

Modern interfaces like FTP and ODBC completely bypass menu security, often allowing end users and even attackers to view, update, and delete data in the database without the restrictions and auditing supplied by the application.
Unfortunately, the vast majority of IBM i organizations still rely on menu security to protect their data. Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.
Join this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. IBM i security expert Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.
You’ll also see how one organization was targeted through FTP and learn how they implemented policies that restrict access to only those users who need it.


(return to top).

PowerTech

 

More employees are working remotely than ever before, but research shows home networks are 3.5 times more likely than corporate networks to have at least one malicious program! It’s critical to grasp the impact these malicious programs can have on IBM i, so that you can keep your systems up and running. Join this session to learn about the relationships between:

  • Viruses, native objects, and the integrated file system (IFS)
  • Power Systems and Windows-based viruses and malware
  • PC-based anti-virus scanning versus native IBM i scanning
There are many ways to minimize your exposure to malware and viruses, even with a remote workforce. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected.


(return to top).

PowerTech

 

Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
In this webinar, IBM i security expert and IBM Champion Robin Tatam explores cyber attacks on IBM i. You'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

  • Learn which security gaps cyber criminals love most
  • Find out how other IBM i organizations have fallen victim
  • Get the details on policies and processes you can implement to protect your organization, even when staff works from home
Robin will describe the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.


(return to top).

HelpSystems

 

IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads.
But what does Power10 mean for your data center?
In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • 7-nanometer processor
  • General availability dates for Power10
  • 1- and 2-node machines
  • Next steps for 3- and 4-node systems
  • TRs for IBM i
Watch now!


(return to top).

PowerTech

 

Can you trust all of your users all of the time?
A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later.
A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime.
In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • How phishing attacks are becoming more sophisticated
  • Three little-known ways malicious programs can reach your IFS
  • Why the IFS is IBM i’s “Typhoid Mary”
You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.


(return to top).

PowerTech

 

Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.
In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.
Robin will cover:

  • Reducing the risk posed by special authorities
  • Establishing object-level security
  • Overseeing user actions and data access
If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.


(return to top).

PowerTech

 

Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim.
But these attacks are also a chance to learn from others’ mistakes. What underlying vulnerabilities were overlooked and how can your organization avoid making similar mistakes?
IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
Join this webinar to learn about the biggest errors made when securing a Power Systems server.
This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA.


(return to top).

HelpSystem

 

IT has undergone a dramatic shift in recent years. For some organizations, a distributed workforce is the new norm. For everyone, threats have ramped up and new compliance mandates are popping up across the globe. Cybersecurity is both more important and more complicated than ever before.
Join this live webinar to learn how your fellow IBM i pros are tackling these issues and get practical, action-oriented tips to help you make improvements on your systems.
IBM i security experts Robin Tatam and Sandi Moore will reveal intelligence gathered from hundreds of IBM i security audits conducted over the past year. You’ll see impartial data around:

  • How many users can access sensitive data
  • Problems with password security
  • Antivirus protection
  • Network access controls
  • Strategies for system auditing
You’ll learn which security controls IBM i organization are prioritizing, the areas IBM i security is falling short, and how to set yourself up for success in today’s threat landscape.


(return to top).

PowerTech

 

You would think that a server hosting mission-critical applications and data would get the most security attention, right? Unfortunately, that is rarely the case with IBM i.
While Security Information and Event Management (SIEM) solutions are an established way to meet compliance mandates and stay on top of suspicious activity, most enterprise SIEM solutions offer little to no coverage for IBM i servers. This means that event data—if even collected—sits abandoned and ignored.
In this webinar, IBM i security expert Robin Tatam discusses a new solution to bridge the gap between your enterprise SIEM solution and your IBM i servers. You’ll learn:

  • How to begin security auditing on IBM i without generating enormous quantities of data
  • 3 common mistakes that IBM i people make when auditing
  • Why regulations state that access monitoring is essential
  • Dangerous events that your audit data may be missing
  • How Powertech SIEM Agent can help identify security threats on IBM i


(return to top).

PowerTech

 

DB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.

Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

  • Use Field Procedures to automate encryption and decryption
  • Restrict and mask field level access by user or group
  • Meet compliance requirements with effective key management and audit trails
In the webinar, you’ll see our Powertech Encryption for IBM i solution. Powertech Encryption will automatically create and manage the FieldProcs needed for encrypting your database fields. Powertech Encryption also includes the security controls, key management, and detailed logging needed to pass audits and meet privacy regulations.

There is no better time to encrypt sensitive data on your IBM i. Watch the webinar today!


(return to top).

PowerTech

 

It’s time to set the record straight about encryption on IBM i.
In fact, the latest IBM i Marketplace Survey shows that many IBM i organizations have no plans to implement database encryption. When you consider all the ways strong encryption could avert a data breach disaster, this is quite a surprising result.
In this webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i. She’ll also give you a peek at our Powertech Encryption solution that makes database encryption easier, faster, and more secure than other options on the market.
If you’re concerned with protecting your IBM i data, you don’t want to miss this event.


(return to top).

PowerTech

 

Forms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.
In this webinar, two experienced cybersecurity professionals—Associate Director of Development Bob Erdman and Principal Security Consultant Sandi Moore—go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
This webinar also reveals the current state of ransomware with 2021 Malware Survey results and provide effective security strategies for prevention, including:

  • Regular review of your security posture and processes
  • Segregation of backups to ensure data is secure
  • Prevention and deterrence programs to avoid infection
  • Detection methods to find threats that break through


(return to top).

PowerTech

 

Malicious programs can bring entire businesses to their knees—and IBM i shops are not immune. Imagine what would happen to your organization if users couldn’t process orders, accept payments, access customer lists, or any number of day-to-day activities.
Despite the rise in crippling malware and ransomware attacks over the past year, many Power Systems owners still don’t see viruses as a risk because they consider them to only be a Windows threat.
It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

  • Viruses, native objects, and the integrated file system (IFS)
  • Power Systems and Windows-based viruses and malware
  • PC-based anti-virus scanning versus native IBM i scanning
There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.


(return to top).

Profound Logic Software, Inc.

 

Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.

In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).


(return to top).

LANSA, Inc.

 

Supply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals.
In this webinar, we discuss how:

  • Low-Code facilitates the development of Supply Chain Collaborative Portals.
  • Value Chain integration enhances visibility, timeliness, and consistency.
  • New technologies help modernize and expand ERP and Legacy Platform support.


(return to top).

PowerTech

 

In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.

There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?

Join IBM i security expert Sandi Moore as she outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.

Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Sandi Moore will show you how to achieve them.


(return to top).

Profound Logic Software, Inc.

 

Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here.
In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control.
Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform.
Attend this webinar to learn:

  • Different tools to develop Node.js applications on IBM i
  • Debugging Node.js
  • The basics of Git and tools to help those new to it
  • Using NodeRun.com as a pre-built development environment


(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 


Interested in IBM Power System White Papers, Webcasts or Software solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center