Blog
Four Key Phases to Digitally Transform Your Document Processes
By Greg J. Schmidt on Mon, 10/19/2020
Embracing digital transformation doesn’t have to be hard. Learn how to take a phased approach to implementing a document and forms management solution and inspire a culture change to transform your business.
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
By Bob Erdman on Mon, 10/19/2020
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their...
Blog
IASPs: What They Are and Why You Need Them on IBM i
By Chuck Losinski on Fri, 10/16/2020
IBM i expert Chuck Stupca and Chuck Losinski presented an engaging webinar about the unique characteristics of IASPs and how application data can be seamlessly migrated to optimize system processes.
On-Demand Webinar
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.
Blog
Benefits of OCR and Document Management
By Greg J. Schmidt on Wed, 10/14/2020
Incorporating OCR for document management can add a surprising level of efficiency, accuracy, and insight into the documents you need to keep business flowing.
Blog
5 Reasons Why Technology is Important in Education
By Kevin Jackson on Mon, 08/24/2020
Great learning doesn’t depend on digital tools. So is technology important in education? Two leading IT pros share why they believe the answer is yes.
Article
IBM i Cloud Security Considerations
Fri, 08/14/2020
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar
Fact or Fiction: IBM i Has Never Been Hacked
By Robin Tatam
In this on-demand webinar, Robin Tatam discusses a documented AS/400 breach, as well as the steps you can take to avoid a similar incident at your own organization.
Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Article
How to Find Your "Normal" with Network Monitoring Software
By Kevin Jackson on Fri, 06/26/2020
With network monitoring software, you can determine what “normal” looks like for your network to easily spot abnormalities, increase uptime, and optimize performance levels.
On-Demand Webinar
Support Your Network During COVID-19 and Beyond with Network Monitoring
Join Kevin Jackson, Technical Solutions Consultant at Fortra, to learn how a network monitoring solution can help you meet the unique challenges of these times and beyond in this on-demand webinar.
On-Demand Webinar
IFS Security: How to Close the Most Commonly Overlooked Security Gap
By Sandi Moore
Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
Blog
Key Considerations for Your Network Monitoring Strategy During COVID-19
By Kevin Jackson on Fri, 05/15/2020
Network monitoring software has never been more important. With companies facing unprecedented challenges during COVID-19—from remote work to budget cuts—here’s what to consider when evaluating your network monitoring needs.