IBM OS/400 White Papers

(View All Report Types)
An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Making the Business Case for Two-Tier ERP
sponsored by Infor
WHITE PAPER: In this e-book learn how to analyze costs and benefits to make an effective business case for two-tier ERP.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Infor

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Project Management and Collaborative Communication
sponsored by Tasktop
WHITE PAPER: This white paper explores how to create a connected software lifecycle to overcome data silos and enable end-to-end visibility for project management. Learn how to connect information across teams and departments to enhance project collaboration and create the communication that digital transformations, Agile, and DevOps principles demand.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Tasktop

Magic Quadrant for Mobile Device Management Software
sponsored by IBM
WHITE PAPER: This Magic Quadrant for mobile device management software explores the top vendors' MDM offerings. Discover the strengths and cautions associated with each MDM vendor to see which one is right for you, or if your current vendor is living up to its competition.
Posted: 13 Aug 2013 | Published: 31 Dec 2012

IBM