On-Demand Webinar
AS/400 Talent Retiring?
AS/400 pros and RPG programmers are retiring from the workforce. Are you prepared to handle the impact? Watch this to learn success strategies from the experts.
On-Demand Webinar
Robot HA in PowerHA Environments
PowerHA is robust, but it may not cover all your bases—SYSBAS, that is! Watch this webinar and learn how to replicate data and applications in SYSBAS.
On-Demand Webinar
How to Move to POWER9 the Right Way
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Guide
Download "A Guide to Practical Single Sign On"
The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple.
With single sign on (SSO), you can eliminate passwords—and the cost associated with them—by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to achieving the ROI you...
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Article
Audit for Role Swap Readiness with Robot HA
By Tom Huntington on Fri, 03/15/2019
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Video
5 IBM i Security Quick Wins
By Sandi Moore
IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
Article
Mobile Management for Your Job Schedule
By Chuck Losinski on Wed, 02/13/2019
Your job schedule has never looked so good! Learn about four must-have features exclusive to the web interface for Robot Schedule.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your AIX Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
On-Demand Webinar
10 Recovery Tips with BRMS for IBM i
Watch this recorded webinar to learn insider tricks for successful recoveries using Backup, Recovery and Media Services for i (BRMS).
Datasheet
Robot Monitor and Database Server Jobs
Robot Monitor IBM i performance monitoring software provides fast resolution for QZDASOINIT job issues. Read on to learn more.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
On-Demand Webinar
Virtualization Considerations for POWER9 Hardware Changes
Watch this webinar and learn how to monitor and replicate your virtualized IBM i environment using Robot Monitor and Robot HA.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.