Resources

Live Webinar
May
14

Why Don't Companies Role Swap?

Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Live Webinar
May
22

Drilldown Options in Sequel Viewpoint

Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Live Webinar
Session Details **This session meets at multiple times.** Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. On May 8, Fortra CISO Chris...
Blog

The 10 Principles of Automation

Our experts developed the following best practices for easing automation implementation and advancing automated operations over the course of 30 years of working to help businesses make their processes more efficient. Let the countdown begin!
Blog

Is the AS/400 Dead?

Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
Blog

How to Succeed at IBM i Security

Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Blog

IBM i: History and Timeline

Did you know that IBM i’s origins pre-date the AS/400 server? Read on for IBM i operating system history and the IBM server history that has supported this powerful platform for decades.
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

Security leaders around the world are dealing with the same challenges: hyperconnected environments, hyperdistributed workforces, and the shifting application of zero trust in an evolving digital landscape. Find out how they are navigating the changes in our first-ever State of Cybersecurity Survey results.