On-Demand Webinar
Automating AP with Completely Paperless Invoice Processing
A comprehensive Accounts Payable document solution will improve your data integrity, speed up your document routing, and make payment processing painless.
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
On-Demand Webinar
How to Protect IBM i from the New Malware Threats of 2020
By Sandi Moore
IBM i has never been immune to malware—but threats to businesses are greater than ever. Watch this webinar to learn how to keep your systems up and running.
Blog
How Document Automation Enables Remote Collaboration
By Greg J. Schmidt on Thu, 04/09/2020
Learn how document automation and an electronic document management system (EDMS) enables your team to easily collaborate from anywhere with secure, standardized workflows, and remote access.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Blog
Streamline HR Processes with Forms Management and RPA
By Greg J. Schmidt on Thu, 03/05/2020
Find out how to automate both frontend and backend HR processes using electronic forms management and robotic process automation (RPA).
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Security Best Practices for the IBM i Administrator
Tue, 01/28/2020
During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
A CISO’s Take on IBM i Security
By Robin Tatam
In this webinar, IBM i security expert Robin Tatam focuses on helping you change perceptions of IBM i at your organization and getting what you need from your management team.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
How FRS Integrated Webdocs to Transform Their Business
Check out this important discussion on how integrating Webdocs within your current processes can truly transform your business.
On-Demand Webinar
AS/400 Security in an IBM i World
By Robin Tatam
Learn why outdated security implementations put IBM i organizations in danger and how you can minimize the risks.
On-Demand Webinar
How to Take a Planned Approach to Document and Forms Management for AP
Watch our on-demand webinar to learn the smartest way to implement document and forms management solutions for Accounts Payable (AP).