Resources

Datasheet

Powertech RSA SecurID Agent for IBM i

SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
Video

IBM's Steve Will Talks IBM i

In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The...
Blog

RPA vs. API: Differences and Use Cases

At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
On-Demand Webinar

How to Avoid the Biggest Mistakes in IBM i Security

Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
Blog

You’ve Upgraded Your Hardware. Now It’s Time to Upgrade Your Security Posture

If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
On-Demand Webinar

Help! I inherited an IBM i!

If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
On-Demand Webinar

The Foundation of IBM i Security Defense

At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
Blog

How to Meet Cyber Insurance Requirements for IBM i

Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
On-Demand Webinar

Boost Your IT Department with RPA from Automate

The pressure facing IT teams has never been higher. With an increase in responsibilities coupled with ongoing staffing shortages, there’s less time to focus on driving innovation and strengthening the value of the business. As challenges grow, ease the burden on your IT department with robotic process automation—to boost productivity, maximize efficiency, and optimize your resources. In this on...