IASP technology can revolutionize your IBM i! Watch this webinar to see it in action—and learn how to keep the disk storage it uses under the watchful eye of Robot.
AS/400 pros and RPG programmers are retiring from the workforce. Are you prepared to handle the impact? Watch this webinar to learn strategies from the experts.
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Robot Schedule automatically and reliably runs millions of iSeries jobs for organizations all over the world every day. Watch this webinar to learn how.
Join David Dingwall, Senior Cybersecurity Strategist, as he discusses how to tighten security, yet still give users the credentials they need to get their work done.
Is your organization using AFP utilities? Or a home-grown forms application cobbled together before your current IT team came on board? Are your reports coming in spool files from your IBM i (AS/400, iSeries)? These systems probably can’t support your business as it grows and changes. Sounds like you need to move on.
What is Intermapper, and why should I choose it? Watch this brief 15-minute overview and find out what makes Intermapper special and how easy it is to get started.
Join Steve Brasen, Research Director with leading analyst firm, Enterprise Management Associates (EMA), and David Dingwall, Senior Cybersecurity Strategist with Fortra, for an informative discussion on the requirements and best practices for enabling a responsible approach to Privileged Access Management.
David Dingwall provides an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.