On-Demand Webinar
Fortra Champions chat about IBM i
In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
Guide
Taking Back Control
In Taking Back Control: A Proactive Approach to Advance Your Security Maturity, learn why adhering to the motto “Prevent First, Detect Always,” is the best way to set and achieve the goals of security operations. Incorporating proactive efforts into your security strategy can serve as the first line of defense by providing significant obstacles that discourage attackers by making breaking in overly labor intensive.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
Guide
Key Considerations in The Ever-Evolving Data Privacy Landscape
Following our recent webinar on The Ever-Evolving Data Privacy Landscape guest speaker and principal analyst at Forrester. Enza Iannopollo, has answered some of the pressing questions we have seen when it comes to building the foundation of your data security strategy.
Article
Space Oddities—What’s in Your IFS?
By Chuck Losinski on Wed, 01/19/2022
Read this article to learn what might be taking up valuable disk space in the IFS and what you can do to control it.
Blog
What is the Data Security Lifecycle?
By Brian Pick on Tue, 01/18/2022
What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
On-Demand Webinar
[Customer Exclusive] Robot Health Check
Watch this webinar to learn housekeeping how-tos for Robot Schedule, Robot Console, Robot Network, and Robot Alert from our top product experts.
On-Demand Webinar
Speed Dating with Robot Monitor
Watch this webinar to learn the 5 key features that make Robot Monitor the right choice for proactive monitoring across your IBM Power environment.
Blog
60+ IBM i User Groups and Communities to Join
By Tom Huntington on Thu, 12/16/2021
To help you stay connected to the thriving IBM i community, we’ve compiled a comprehensive list of IBM i user groups around the world. Read on!
Press Release
Why Zero Trust is Important in the Work From Anywhere Era
How important is a zero-trust approach to ensuring effective cybersecurity in the work-from-anywhere era? Steph Charbonneau answers the editor’s question in Intelligent CISO.
Blog
What Does Ansible Mean for IBM i Automation?
By Tom Huntington on Mon, 12/06/2021
Ansible is good for the IBM i platform as it provides additional automation around burdensome IT tasks. Learn more here.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
On-Demand Webinar
How to Convert from AJS or WRKJOBSCDE to Robot Schedule with Ease
Today’s IT teams need automation tools that can help them plan for tomorrow instead of playing catch-up. In this recorded webinar, IBM i experts introduce you to the final phase of your automation evolution: Robot Schedule.
On-Demand Webinar
IBM i Automation Series: Performance
Watch this webinar series for your FREE opportunity to learn what every user should know about Robot Monitor and Performance Navigator software for IBM i (iSeries, AS/400) monitoring, plus advanced tips and tricks.
On-Demand Webinar
IBM i Gets No Respect
Watch this webinar to learn what you should do to safeguard IBM i when adding additional partitions (VMs), standardizing technologies, migrating or consolidating servers, and more!
Press Release
Why Consumer Demand for Better Data Privacy is Escalating
Steph Charbonneau writes in Datacenter Dynamics looking at what’s driving demand for enhanced privacy and data protection.