Blog
Could IBM i Have Been Part of the Equifax Breach?
Tue, 11/28/2017
If IBM i was part of the Equifax data breach, what could that organization have done to protect their data? Fortra security expert has some ideas.
Blog
Building an Automation Center of Excellence Part Two: Scalable RPA Infrastructure
Sun, 11/26/2017
Blog
Faster and Easier IBM i Password Resets
By Robin Tatam on Wed, 11/08/2017
Security expert Robin Tatam explains an easy way to spend less time and resources on resetting IBM i passwords.
Guide
Download "IBM i Security and Integrity Monitoring Handbook"
Data breaches increase in number and severity every year. Putting barriers in place to stop attackers is an important part of any data protection plan, but barriers alone aren’t enough.
Today’s top IT profressionals know that verifying the effectiveness of cybersecurity controls is critical. After all, most breaches go months before they’re discovered.
Monitoring your security and regularly...
Blog
Building an Automation Center of Excellence Part One: People and Processes
Fri, 10/20/2017
Watch our automation center of excellence webinar or read the blog to learn about the people and processes you need to build an RPA center of excellence for your organization.
Blog
How to Automate Security Policy Enforcement
By Robin Tatam on Wed, 10/18/2017
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Guide
The Business Leader’s Handbook for Building an Automation Center of Excellence
Creating an automation center of excellence (COE) ensures that you are automating your enterprise with strategy and vision. This guide gives you the expertise you need to put together a great team, follow best practices, and continually optimize your automation COE.
Guide
Maximizing Your RPA ROI
Learn how you can maximize RPA ROI with a long-term vision, knowledge of potential costs, and the savings that come from implementing an RPA solution.
Guide
The Robotic Process Automation Toolkit
Automating tasks is easy, but building an automation center of excellence to promote strategic automation in your organization takes more planning. Based on our years of experience helping enterprises automate, we’ve compiled a collection of robotic process automation tools and resources to set you up for automation success.
The toolkit is designed to guide you through all the steps of your...
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
Blog
Can a Small Business Benefit from Business Process Automation?
Mon, 08/07/2017
Small businesses often stick to their manual processes and leave automation to the big corporations. After all, they’ve always done things this way, so why would they need to change? Read the blog to find out how business process automation can give your small business a competitive edge.
Blog
Seven Software Robots Your Business Needs
Fri, 07/28/2017
Discover the 7 software robots your business needs to reduce repetitive and manual tasks, automate reporting, process claims and more in this blog post from Fortra.
Guide
Download "Why Managed Services Is Becoming IT Security’s Top Trend"
It’s time to reconsider traditional approaches to cybersecurity.
Handling IT security in-house is the norm at most organizations.
But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever.
With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to...
Blog
HR Onboarding and Process Automation Made Easy (Webinar Recap)
Thu, 07/13/2017
Learn how Fortra can help you automate HR processes, specifically when it comes to onboarding.
Blog
HR Automation Tips Part 2: How to Get Started with HR Automation
By Richard Schoen on Thu, 06/22/2017
Choose your path to automating HR—and focus on what matters most.
Guide
Download "File Integrity Monitoring for Power Systems Running IBM i"
Data breaches have increased dramatically in the past 10 years. In response, numerous regulatory standards have been created, including the Sarbanes-Oxley Act, HIPAA, and PCI DSS.
These standards require organizations to adopt security best practices. One key best practice is file integrity monitoring (FIM): making sure any changes made to server configurations and critical application data are...