Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be...
This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
To cope with system issues, you want easy yet comprehensive solutions that handle your performance, messaging, and remote management needs, but what you really need are integrated solutions for universal control. See where Robot Monitor fits in.
Use a real-time monitoring tool with thresholds and drill-down capabilities to speed root cause analysis and problem determination for application and resource performance issues on IBM i.
Knowing a job’s CPU usage, disk I/O, temporary storage, and so on is fine, but what you really want to know is how the job is doing. And we can see a job's status on IBM i. Here's how.
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Safeguard your infrastructure and data
With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources...
When you apply rules to system events, automation software like Robot Console works like the autopilot on a boat or plane—it steers the system through the night or the weekend while you rest.
Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose.
The 2021 Pen Testing Report highlights...
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
During this 1-hour session, Fortra and LaserVault experts join forces to discuss the merits of virtual tape and show you how VTL technology can replace your traditional tape backups.
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...