In this webinar, IBM i security expert Sandi Moore provides valuable information to help minimize your exposure to malware and viruses, even with a remote workforce.
Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
During this 1-hour session, Fortra and LaserVault experts join forces to discuss the merits of virtual tape and show you how VTL technology can replace your traditional tape backups.
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
In this session, you’ll see how RDi is strategically designed to help developers like you deliver impactful software to your organization faster and with higher quality.
Watch this webinar to learn what every beginner should know about Robot Schedule batch process management and workload automation software for IBM i (AS/400, iSeries).
It’s more work to plan an upgrade than to make the upgrade itself. Darren Anderson and IBM Champion Tom Huntington help you discover what you need to upgrade to IBM i 7.4.
When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!