Resources

On-Demand Webinar

Move Past Roadblocks and Successfully Scale RPA in Your Organization

Many RPA implementations start with one area of the business then look to expand onward after initial success. Scaling any software across an organization will have challenges, and RPA is no exception. Not only is there the question of scaling being cost-prohibitive, but organizations sometimes struggle to move beyond the initial use case and get buy-in from other business units. Your...
On-Demand Webinar

JAMS Feature Tour

Join Robert Newman for this condensed feature tour!
On-Demand Webinar

Maxmize ERP System Processes with RPA

A lot of businesses depend on their ERP system to conduct business. Whether it’s SAP, Syspro, Microsoft Dynamics, M1, NetSuite, or another ERP, critical data is processed and stored every day. These systems are powerful for managing business processes, but the built-in capabilities aren’t enough. So many businesses spend hours and manual effort prepping data, launching ERP procedures, and other...
On-Demand Webinar

IBM i Security for Programmers

In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar

How to Avoid IFS Security Mistakes

In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Video

5 IBM i Security Quick Wins

IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.