Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Article
IBM i Cloud Security Considerations
Fri, 08/14/2020
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar
Fact or Fiction: IBM i Has Never Been Hacked
By Robin Tatam
In this on-demand webinar, Robin Tatam discusses a documented AS/400 breach, as well as the steps you can take to avoid a similar incident at your own organization.
On-Demand Webinar
How to Do IT Cost Optimization
By Per Bauer
30% of hybrid IT spend is wasted. Whether you find that number shocking or not, you likely don’t know how to identify and eliminate the wasted spend while assuring performance.
Many organizations have adopted a “performance at any cost” mindset to ensure service delivery and choose to overprovision IT resources for peace of mind. But the cost of overprovisioning adds up and quickly becomes...
Guide
How to Do IT Cost Optimization
Our years of experience shows that organizations waste 30% of their hybrid IT spend, on average. This article identifies the five key components of a cost optimization strategy and how to be successful with each of them.
On-Demand Webinar
IFS Security: How to Close the Most Commonly Overlooked Security Gap
By Sandi Moore
Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
On-Demand Webinar
How to Protect IBM i from the New Malware Threats of 2020
By Sandi Moore
IBM i has never been immune to malware—but threats to businesses are greater than ever. Watch this webinar to learn how to keep your systems up and running.
On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
On-Demand Webinar
Where to Start with IBM i Monitoring
Watch this recorded webinar to learn how Robot Console software can identify bad data, application issues, and device malfunctions and help you monitor IBM i partitions by exception.
On-Demand Webinar
Security Best Practices for the IBM i Administrator
Tue, 01/28/2020
During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.