Blog
Why Should You Delete Journal Receivers?
By Tom Huntington on Thu, 10/17/2019
Excessive disk space usage causes your IBM i (iSeries, AS/400) backups and disk reporting to take longer. It's best practice to automate clean-up for your journal receivers. Here's how.
Blog
Automating SharePoint Monitoring for Better Collaboration
Mon, 09/30/2019
Learn how you can use robotic process automation (RPA) to set up a Microsoft SharePoint monitoring task to monitor SharePoint folders and take actions to automatically move, change files, and send email notifications using Automate.
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?
I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis.
Visit this page to get access to...
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
The Ongoing Truth About Viruses on Linux
By Bob Erdman
This webinar focuses on providing an action plan to ensure your Linux environment is properly bolstered against attacks.
On-Demand Webinar
How to Meet the Newest Encryption Requirements on IBM i
By Robin Tatam
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity. But how do you meet encryption mandates on IBM i?
On-Demand Webinar
How to Avoid a Billion-Dollar IBM i Security Disaster
By Robin Tatam
Watch this live webinar to decode common requirements and build a roadmap to compliance for IBM i.
On-Demand Webinar
Maxmize ERP System Processes with RPA
By Pat Cameron
A lot of businesses depend on their ERP system to conduct business. Whether it’s SAP, Syspro, Microsoft Dynamics, M1, NetSuite, or another ERP, critical data is processed and stored every day. These systems are powerful for managing business processes, but the built-in capabilities aren’t enough.
So many businesses spend hours and manual effort prepping data, launching ERP procedures, and other...
Blog
The Pros and Cons of Python Web Automation
Tue, 09/03/2019
Discover the pros and cons of using Python for website automation, and learn how robotic process automation (RPA) can provide you a better solution for web automation.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
Article
Empower Your Security Monitor with Powertech SIEM Agent for IBM i
By Robin Tatam on Wed, 08/28/2019
Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.
On-Demand Webinar
What’s New in IBM i Security in V7R4 (and Other Great Things)
Tue, 08/27/2019
Get the details on new IBM i security features in this session.
Article
Outlook Automation: How to Automate Emails in Outlook
By Pat Cameron on Fri, 08/23/2019
Media
Text
One of the most common email automation tasks in Outlook is processing attachments from incoming email. More specifically, downloading and processing invoices is one of the...
Article
HelpSystems (now Fortra) Makes Debut Appearance as Major Contender in Everest Group RPA Products PEAK Matrix™ for 2019
Fri, 08/23/2019
Media
Text
In the...
On-Demand Webinar
IBM i Security for Programmers
By Robin Tatam
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.