Resources

Blog

10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be exceedingly complicated. But they don’t have to be—as...
Article

Virtual Tape Considerations for IBM i

This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
On-Demand Webinar

Top 3 Reasons Why You’re Scared of Role Swaps

Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
Datasheet

Fortra Cybersecurity

Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way. It’s time to protect your organization with proactive, automated...
Guide

A Guide to IBM i Message Management

This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
On-Demand Webinar

Data Security Challenges: How Our Suite Helps

Data security is hard. We’re not going to sugarcoat it. In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps address And more! If you are curious about our...
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.