Resources

On-Demand Webinar

IBM i Performance Week

Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!
News Article

TheMilSource: Where Are We on the US TikTok Ban?

Earlier this year, the US President signed a law that would ban TikTok unless its China-based parent company relinquishes its stake. In his discussion with TheMilSource, Antonio Sanchez shared his take on whether ByteDance would sell its stake.
On-Demand Webinar

Making the Most of the Audit Journal

Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
News Article

Investopedia: How to Report Identity Theft

What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Guide

How to Use Upskilling and Reskilling to Scale Your Cybersecurity Team

The cybersecurity skills shortage is not just an ongoing inconvenience—it is a serious vulnerability that can be exploited by attackers. But how can organizations go about patching this gap while the talent gap endures? The answer lies in leveraging the resources you already have on hand: your existing workforce. How do you transform your existing personnel to meet today’s cybersecurity demands?...
On-Demand Webinar

Be an Automation Hero: Unleash Your Superhuman Abilities

Facing increased workloads, fewer resources, and waiting for someone to come save the day? Never fear, Fortra’s Automate is here! Automate takes the power of robotic process automation (RPA) to new heights using four distinct capabilities. These superpowers come together to turn anyone—regardless of coding experience—from a zero to an automation hero. In this on-demand webinar, Darrell Walker,...
On-Demand Webinar

Ensuring compliance with DORA and NIS2 for IBM Power

Most organizations have to comply with some regulation or cybersecurity standard and keeping up with changing requirements is often a challenge. DORA and the updated NIS2 directive by EU are just around the corner and will raise the bar even further. Join this session to find out what the new requirements are and how your IBM Power systems may be impacted. With a finite amount of resources, it’s...
On-Demand Webinar

Elevating Cloud Security: MFT Best Practices & Insights

Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. GoAnywhere Managed File Transfer (MFT) solution provides the security and control needed to move data confidently between systems, locations, users, and trading partners.In this webinar, we will delve into the design and architecture...