On-Demand Webinar
AS/400 Report Deployment for Remote Users
Watch this webinar for a unique opportunity to see how to deliver data to business users in way they have never seen before.
Article
Three Advanced Scripting Tips That Help Solve Reporting Challenges
By Heath Kath on Fri, 05/08/2020
See how Sequel scripts make it easy to link together multi-step processes rather than manually running a series of steps to accomplish a complex task.
Datasheet
Anydate
See how easy it is to run your IBM i jobs in the past, present, and future with Anydate.
Blog
Why Shared Drives Are Bad for Your Documents
By Greg J. Schmidt on Fri, 04/17/2020
Without proper care, shared drives can easily turn into a document graveyard. Find out how to make yours work—and how to move on.
Datasheet
Esend
Fast email and FTP distribution solution for IBM i data. Schedule a demo of Esend today.
On-Demand Webinar
Ask the Data Warehouse Experts
By Alan Jordan
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
Blog
How Document Automation Enables Remote Collaboration
By Greg J. Schmidt on Thu, 04/09/2020
Learn how document automation and an electronic document management system (EDMS) enables your team to easily collaborate from anywhere with secure, standardized workflows, and remote access.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Blog
Four Network Security Challenges for Organizations with a Remote Workforce
By Bob Erdman on Wed, 03/25/2020
Press Release
HelpSystems (now Fortra) buys 'ethical hacking' company, beefing up its cybersecurity business
HelpSystems has bought Strategic Cyber LLC, an "ethical hacker" that does business as Cobalt Strike, in the Eden Prairie company's latest move to beef up its cybersecurity presence.
On-Demand Webinar
20 Hidden Gems of Db2 for i
This webinar shares some of the best-kept secrets in Db2 for i and will help make sure you're using it to its full potential.
Blog
The Difference Between BPA and Job Scheduling and When You Need Both
Thu, 02/27/2020
BPA and job scheduling aren't mutually exclusive. In fact, an enterprise may use a job scheduler to support its wider BPA strategy.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Article
Vityl Capacity Management 2.6 Advances Service and Cluster Monitoring and Increases Kubernetes Support
Fri, 02/07/2020
The latest release of Vityl Capacity Management includes improved dashboard capabilities, automated intelligent alerting, and other enhancements.
On-Demand Webinar
How to Choose a Capacity Management Tool
By Per Bauer
Finding the right capacity management tool for your organization can be a complex and confusing process. How do you start the search? Which features and capabilities should you prioritize? It’s important to have a plan and a framework to evaluate your options.
Join capacity management expert, Per Bauer, as he explains the different types of capacity management tools and how to evaluate each one...
Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.