Training
Fortra's Automate: Build-A-Bot Workshop
The Build-A-Bot Workshop is designed to fast track your company's automation initiatives. This workshop is delivered in three segments to maximize the knowledge transfer of what RPA can do, how to prioritize process candidates, and get started with bots.
The implementation activities are delivered on a pre-paid basis.
Key Deliverables
Quick, in-depth assessment of Automate
Kickstart...
On-Demand Webinar
Trusty Host Reports and Flashy Client Reports: Get to Know Them Both
Watch now for an informative webinar where Sequel experts will discuss when to use either a host report or client report and the benefits of both.
On-Demand Webinar
How to Upgrade to IBM i 7.5
During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done!
On-Demand Webinar
Meet Fortra: Your Cybersecurity Ally
By Mike Devine
This session is a must for those eager to understand how the Fortra team of expert problem solvers is ready to find answers to your organization’s toughest problems, and how we remain committed to being a people-first company ready to collaborate with our customers.
Datasheet
Offensive Security - Elite Bundle
Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that...
On-Demand Webinar
Simple Ways to Tame Document Chaos
Modern organizations need critical documents to be readily accessible and secure. Watch this 30-minute webinar to learn how web-based document management systems can streamline document control and improve efficiency.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Datasheet
Offensive Security - Essentials Bundle
Fortra Vulnerability Management (formerly Frontline VM™) and Core Impact are two robust security tools designed to evaluate business critical networks and infrastructure for security vulnerabilities.Though both tools work to identify and prioritize security weaknesses, each offers unique strengths and distinct features. Fortra VM is a SaaS vulnerability management solution, mostly used for...
Datasheet
Offensive Security - Advanced Bundle
Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features.
Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
Datasheet
Fortra Ransomware Defense
As part of the Fortra cybersecurity portfolio, Fortra Ransomware Defense enables companies to mitigate the risk of ransomware attacks with early detection and proven prevention capabilities.
On-Demand Webinar
IBM i Automation Series: Job Scheduling
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar
Boost Your IT Department with RPA from Automate
Thu, 06/23/2022
The pressure facing IT teams has never been higher. With an increase in responsibilities coupled with ongoing staffing shortages, there’s less time to focus on driving innovation and strengthening the value of the business.
As challenges grow, ease the burden on your IT department with robotic process automation—to boost productivity, maximize efficiency, and optimize your resources.
In this on...
On-Demand Webinar
Build a More Resilient Business with Fortra’s Hyperautomation Suite
Thu, 06/23/2022
Organizations everywhere are looking for a way to expand their automation footprint to further optimize operations. And they’re turning to hyperautomation. What started as an industry buzzword has quickly emerged as a necessary strategy that allows organizations to digitally transform their business to be more resilient, agile—and competitive.
Darrell Walker, Solutions Engineer, will take you...
On-Demand Webinar
How to Keep Sensitive Data Safe and Compliant
By Nick Hogg
Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...
On-Demand Webinar
Intermapper Customer Workshop
Wed, 06/15/2022
In this informative session, Kevin Jackson, Solutions Engineer, and Steve Vold, Senior Support Analyst, share tips and best practices for getting the most out of Intermapper.
On-Demand Webinar
Modernize Business Intelligence in 2023
Watch this webinar to see how Sequel software makes your transition to modern data access and analysis from Query/400 simple.
Datasheet
LEVEL 4: Operations Center Suite
Does This Sound Familiar?
How would you answer the following questions?
Can you schedule highly complex job streams and track them across different IBM i systems or servers?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or users and take...
Datasheet
LEVEL 3: Advanced Automation Suite
Does This Sound Familiar?
How would you answer the following questions?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action?
Can you automate disk space management, freeing technical resources for other...
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...