Modernizing for Today’s Heterogeneous Z Enterprise and the aspects of transforming and modernizing Job data and Sysout archive services for adding customer value today.
The emergence of Enterprise DevOps presents a renewed opportunity to leverage the power of metrics to facilitate collaborative success across the systems development life cycle (SDLC).
Common migration issues, and how to avoid them by using proven practices. Learn how to migrate to a better system without unnecessary stress or potentially costly errors.
Within this webinar we explored SEA's Eclipse Plug-in's new features and capabilities and discussed how they allow developers to quickly find defects and more easily identify the impacts of their changes.
In this webinar we explore SEA's batch / Sysout practice and framework, current Eclipse Plugin solutions available, as well as current trends and best practices to keep an eye on.
Watch this webinar to see us discuss the key changes and modifications in the latest OS releases and how they impact your JCL & Batch environment.
Is your current z System Output Management solution plagued with spiraling costs and limiting architecture? Are you looking to contain mainframe costs yet still deliver the accessibility and flexibility for your customers that today’s market trends demand?
See how the functionality of the world’s leading JCL Management solution, SEA Plus+Pack, enables you to implement best practices techniques to ensure the highest quality batch JCL Production environment.
Discover the unique challenges and opportunities in adopting a DevOps approach on the mainframe.
An in depth break down of the process for organizations considering moving to a new output management solution into manageable steps.
Mainframe data centers respond faster through DevOps and Agile, an approach that combines development, testing, and deployment in one fluid process. Learn more about how Batch and Agile can work together to boost mainframe efficiency.
Understand the issues that must be addressed in every IT organization for production error prevention through the deployment of Best Practices for managing JCL as an asset.
These practical and incremental steps will help drive quality as early as possible in the development process and take todays Dev and Ops Teams a long way toward rolling out new releases much more frequently.
Learn how you can identify, validate and measure the key performance areas for a Optimized JCL Environment.
With no recent improvements to the incumbent vendor's tool and with no forward looking roadmap, the choice turned out to be pretty obvious. SRP opted for JCLplus+ and XREFplus+ DBr which are part of the Plus+Pack suite of JCL management products from Software Engineering of America (SEA).
Avon’s existing online report distribution solution was aging. With 6 million independent agents around the world, and a $6B business to run, the need for online report distribution and viewing was paramount. See how Avon modernized their report distribution with SEA's TRMS solution.
In this guide, we'll discuss why thoroughly implementing your IBM i message monitoring solution matters. Includes an interactive checklist outlining which messages/resources can be monitored, and why.
In this guide, we'll discuss the tools you need to collect and organize IBM i machine data, and why it's important to do so.
How to effectively encrypt your IBM i data in a multi-layer key encryption using iSecurity Encryption.
we discuss how we solve 5 common issues companies face when implementing a monitoring solution for the IBM i, as well as the risk of leaving certain messages to manual monitoring and what to consider when automating monitoring & reactions across the enterprise.
In this webinar as we discuss how to effectively encrypt your IBM i sensitive data columns at rest as well as in transit using iSecurity Encryption.
Although the IBM i platform could be considered the most securable platform in any business or organization, many still haven't fully taken advantage of this incredible technological feature. In this webinar we outline 5 critical risks to your IBM i environment, as well as what you can do to avoid them.
Watch our webinar as we discuss what IBM i data should be sent to an enterprise SIEM product and the best ways to manage the transmission of data from the IBM i to an enterprise SIEM solution.
Watch our webinar to learn how Viruses and Malware affect your IBM i systems, how to safeguard your system and what to look for in an IBM i based Anti-Virus and Malware solution.
In this webinar we discuss 5 reasons why your company should move beyond the native IBM i Job Scheduler to a more robust scheduling platform.
Within this webinar we'll break down the money and time utilized with manual password reset, the risks you may be exposing your company to, and show you how automated password reset solutions work.
View our Introducing absScheduler webinar, as we explore the challenges IBM i users face when it comes to scheduling and automating workflows. We break down the key pain points of scheduling and give a live demo of our latest solution, absScheduler.
Find out what features and benefits to expect when implementing a message and resource monitoring solution, tips & strategies for getting your implementation started, and some of the unexpected benefits you may experience afterward.
Learn more about how Viruses and Malware affect IBM i systems and learn more how about an IBM i based Anti-Virus solution can enhance your security and eliminate virus and malware.
Learn about the capabilities of iSecurity Syslog, the types of data that can be integrated into an enterprise SIEM solution, and the key criteria for implementation.
How to use iSecurity's Visualizer Business Intelligence tool to identify five common security and data issues.
Part of the iSecurity Suite, SEA's iSecurity Audit is a system security audit module that enhances native IBM i auditing through enhanced features, a user friendly interface, and much more.
The iSecurity Encryption solution, part of the iSecurity suite, allows you to fully protect all sensitive data and meet your compliance and regulatory requirements.
This overview of iSecurity Anti-Virus discusses how the IBM i IFS can host viruses & malware, and how iSecurity Anti-Virus can provide flexible anti-virus protection for the IBM i (AS/400).
iSecurity Suite includes end to end security, monitoring, auditing and reporting solutions for the IBM i (AS400, iSeries) systems. See what it can do for your system in this short video.
iSecurity Assessment provides an in-depth look into your IBM i/AS400/iSeries system security. The iSecurity Assessment by Software Engineering of America is provided at no cost and is non-intrusive, installing directly to your PC and not your IBM i/AS400/iSeries system. See how to get started by watching by watching this quick video.
iSecurity Syslog provides real-time transmission of IBM i (AS/400) security event information to enterprise SIEM solutions. See how it works in this quick video.
See how iSecurity Firewall gives users the ability to monitor, report, & control access over many IBM exit points in this quick video.
See how absScheduler automates and simplifies the management and monitoring of batch processes on IBM i systems in this short video.
After decades of faithful service, the benefits of the Native Scheduler for the IBM i have passed their prime. In most instances, users of the native scheduler are missing out on key features, such as Job dependency, Run days, and more.
The native IBM i job scheduler is a basic product that offers limited capabilities for scheduling and managing batch jobs. It satisfies basic processing needs, but prevents organizations from using more advanced scheduling and management capabilities for business needs.
The IBM i 7.1 operating system has reached end of life and is no longer supported by IBM. But what does end of life mean for you if you're still running IBM i 7.1 partitions? Find out in this whitepaper.
The IBM i is fully capable of integrating its system and security data with a syslog server, at a reasonable cost. Any shop needing a SIEM integration solution can use this white paper as a guide in implementing their own project.
Learn how Self Service Password Resets Can Increase Productivity, Repair Relationships, Reduce Risk, and Lower IT costs
Organizations that have to comply with Sarbanes-Oxley (SOX) have realized that IT controls are essential to complying with Section 404 of the Sarbanes-Oxley Act. Learn how SEA's solutions for the IBM i assist in achieving SOX compliance.
HIPAA was enacted in 1996 with the goal of establishing a set of laws to protect individuals’ health information, document the rights of health providers and patients. This whitepaper highlights the areas of importance for your IBM i environment and how SEA Solutions can help you achieve compliance.
This whitepaper highlights how SEA solution's for the IBM i help to companies in to comply with the Payment Card Industry (PCI) regulations.
The Gramm-Leach Bliley Act of 1999 (GLBA), or the Financial Modernization Act of 1999, was enacted to protect consumer financial information and personal records. All financial institutions are required to adhere to these standards, as they protect consumer confidential information. Learn how SEA's IBM i solutions help you comply with GLBA requirements
The Federal Information Security Management Act, or FISMA, is Title III of the EGovernment Act. The act requires each government agency to secure the information and information systems that support its operations. Learn how SEA solutions for the IBM i can help your organization comply with FISMA.
SEA tools enable Columbia Insurance Group to automate their manual nightly IBM i processing schedule, create dependencies across all systems, and monitor running jobs using absScheduler.
See how SEA helped Heartland solve four of its biggest auditing and reporting challenges by integrating iSecurity products into Heartland’s IBM i security scheme.
SEA helped create a three-pronged solution that helps Carhartt meet and maintain PCI DSS compliance, protect it from incurring non-compliance penalties, avoid possible suspension of credit card processing capabilities if a major breach occurs, and help Carhartt maintain its reputation as a secure credit card processor with its customers, business partners, and vendors.
Faced with having to comply with J- SOX due to a partial ownership of the company in Japan, Bob Bodinof (Business Analyst) and the IT staff selected iSecurity to provide the reporting and security necessary for their J- SOX audits.
Alpine realized it needed to improve its auditing and security capabilities on the iSeries. Read why they chose the iSecurity suite.
How Shaw Broadcast Services uses absMessage for their Centralized Message Management and Resource Analysis.
Polaris’s existing IBM i system and message management software had functional limitations. AbsMessage provided increased functionality while cutting costs.
System backups were using too many of Bahamas Telecommunications' resources. AbsCompress helped solve their space issues while saving BTC money.
After making the switch to iSecurity, First Acceptance feels more confident about the security of their systems, especially with SEA's customer support behind them.
To receive updates and the latest industry content for IBM Z, and IBM i!
We’re happy to answer any questions about our software and what we do.
Copyright© 2015 Software Engineering of America, Inc. All Rights reserved.