Resources

Guide

Download "Childhood's End: Attackers Increasingly Take Aim at Linux Systems"

Like the wide-eyed humans who mistakenly trust their benevolent alien overlords in Arthur C. Clarke’s science-fiction classic, Linux users the world over are beginning to awaken to the reality that their malware- free utopian childhood is rapidly coming to an end. A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes since 2015 means the...
Case Study

Concrete Producer Keeps Trucks Rolling by Automate-ing Event Log Monitoring

Background With more than 400 ready-mix concrete trucks on the street at any given time, St. Marys Canada Building Materials (CBM) relies heavily on real-time data transmitted from those vehicles to its fleet management software to meet customers' construction schedules. The company uses Automate, the robotic process automation (RPA) solution from Fortra, to help maintain the data flow by...
Case Study

Single Source Keeps Staff Small and Business Running Smoothly with Automate

Background Single Source is a large-volume provider of dry, refrigerated, frozen, grocery, paper, and chemical products for institutional commissaries, primarily correction institutions. The company processes and ships approximately 250 million pounds of food each year, nationwide, and they do it all with only 22 employees. As a small business with a high volume of orders to process and ship,...
Guide

Fortra Data Management Survey Results

Fortra surveyed hundreds of professionals around the world and across multiple industries to discover how enterprises are managing data, why they are underprepared for an era of data-driven business, and how they can overcome the data management challenges they are facing.
Guide

Download "IBM i Security and Integrity Monitoring Handbook"

Data breaches increase in number and severity every year. Putting barriers in place to stop attackers is an important part of any data protection plan, but barriers alone aren’t enough. Today’s top IT profressionals know that verifying the effectiveness of cybersecurity controls is critical. After all, most breaches go months before they’re discovered. Monitoring your security and regularly...
Guide

Maximizing Your RPA ROI

Learn how you can maximize RPA ROI with a long-term vision, knowledge of potential costs, and the savings that come from implementing an RPA solution.
Guide

The Robotic Process Automation Toolkit

Automating tasks is easy, but building an automation center of excellence to promote strategic automation in your organization takes more planning. Based on our years of experience helping enterprises automate, we’ve compiled a collection of robotic process automation tools and resources to set you up for automation success. The toolkit is designed to guide you through all the steps of your...
Guide

Download "IBM i Encryption: How to Protect Your Database"

Learn your options for encrypting IBM i data. Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property. Encryption is widely recognized as the most effective way to ensure private...
Guide

Download "Why Managed Services Is Becoming IT Security’s Top Trend"

It’s time to reconsider traditional approaches to cybersecurity. Handling IT security in-house is the norm at most organizations. But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever. With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to...
Guide

Download "File Integrity Monitoring for Power Systems Running IBM i"

Data breaches have increased dramatically in the past 10 years. In response, numerous regulatory standards have been created, including the Sarbanes-Oxley Act, HIPAA, and PCI DSS. These standards require organizations to adopt security best practices. One key best practice is file integrity monitoring (FIM): making sure any changes made to server configurations and critical application data are...
Case Study

TransAlta Prevents Data Loss with Robotic Process Automation from Automate

TransAlta Corporation is a multinational power generation and wholesale marketing company with yearly revenue of about $2.5 billion. Based in Canada, TransAlta manages the production and delivery of energy resources over a wide geographical expanse. This requires a sophisticated network of control systems for thousands of pumps, valves, gas turbines, high voltage breakers, and more. In the Ontario...
Case Study

Children's Museum Creates One-of-a-Kind Interactive Exhibit Using Automate

The Children's Museum of Science and Technology in Troy, New York was founded in 1954 and is located in the Rensselaer Technology Park. Its mission is to be the premier science center in the New York Capital Region where kids and parents can explore, discover, and imagine the world of science together. ...
Case Study

30 Minutes of Automating Cuts Infor ERP VISUAL Work by an Hour a Day

In the quest for IT efficiency, one way to save time is to automate the daily grind of launching and monitoring ERP system utilities. Washington-based job shop Magic Metals, Inc., sought to do just that when it implemented Infor ERP VISUAL, but the company's busy IT manager did not have time to write custom scripts to enable VISUAL utilities to self-execute. Instead, he turned to the pre...
Case Study

Manufacturer Cuts 2 ½ Hours of Daily ERP Work with Automate

For years, an IT staffer at ITW Construction Products had to come to work early every morning to prepare the company's ERP system for the new day. At first, the process of incorporating the previous day's business activities into the ERP database took thirty minutes. As the company grew, the job ballooned to 2 ½ hours. Rather than continuing to waste valuable time repeating the same tasks day...
Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled. Download this guide...
Case Study

Automate Streamlines Lottery Operations and Reporting in Louisiana

Louisiana Lottery Corporation was created in 1991 by the Louisiana state legislature with the idea of generating revenue without increasing taxes. Its mission is to organize, manage, and oversee the operations which support the Louisiana Lottery. Responsibilities entail all collections, accounting, auditing, reporting, and support for the thousands of retailers who sell lottery tickets for games...
Case Study

Robotic Process Automation Case Study: Automate Integrates Critical Applications for a Major Medical Center

The University of Texas MD Anderson Cancer Center has the challenge of staffing and managing thousands of nurses busy delivering top-notch patient care. To manage this complexity, MD Anderson relies on three critical applications: a human resource system by PeopleSoft, a time and attendance system by Kronos, and a staffing system by Per-Se's ANSOS One-Staff. These three applications (with their...