Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog
The Pros and Cons of Scripting
Thu, 03/21/2019
There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Video
5 IBM i Security Quick Wins
By Sandi Moore
IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
Blog
12 Skills Every Security Administrator Needs for Success (and How to Learn Them)
By Robin Tatam on Sat, 03/09/2019
Mastering these 12 skills can make a security administrator a powerful weapon against data breaches.
Blog
HR Automation Tips Part 3: What Happens When You Automate HR Processes
Sat, 03/09/2019
Automating your HR processes can transform the way your human resources department operates. Find out what will happen when you automate HR.
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
Blog
35 Cybersecurity Risks for IBM i Administrators and How to Thwart Them
By Robin Tatam on Wed, 02/27/2019
Here’s a rundown of commonly overlooked IBM i cybersecurity risks and how to make sure they don’t open your business up to a disastrous situation.
Blog
What's the Difference? RPA vs BPA
Tue, 02/26/2019
Learn the difference between robotic process automation (RPA) and business process automation (BPA) and how both can help streamline tedious tasks and make processes more efficient.
On-Demand Webinar
6 Things You Can Do for IBM i Security (Even When Management Doesn’t Care)
Tue, 02/26/2019
Watch this on-demand webinar to learn how to convince your management team to address IBM i security.
Blog
The Efficiency Perks of Cloud Automation
Fri, 02/15/2019
Whether you’ve got a full cloud presence already built or are evaluating how to begin, learn more about the benefits of cloud automation.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your AIX Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
Blog
8 User Groups & Communities to Join for RPA Fans
Fri, 01/25/2019
As you begin learning about robotic process automation (RPA) and how it can support improved task handling throughout your organization, finding user groups and communities of like-minded individuals and experts can be a big help.
Blog
Compliance Tasks Made Easy with RPA: Control Your Data for Seamless Compliance
Mon, 01/21/2019
Data security is a top concern for modern businesses. And many organizations have industry standards, like HIPAA or government regulations, like GDPR, they must stay compliant with. Keeping your data secure and your processes compliant can seem complicated, especially if you’re using many different types of business applications in your daily tasks. That’s why it’s important to choose tools with built-in security.
On-Demand Webinar
Bridge the Gap Between IT and Business: How to Engage the Business in Digital Transformation
Wed, 01/16/2019
An estimated 60 to 70 percent of initial robotic process automation (RPA) projects fail to meet expectations. Companies want to embrace the transformative technology, but with no sense of where to start and what processes to automate, their projects are dead on arrival.
Business and IT need to partner together to find strong initial candidates for automation that return positive ROI and create...
Blog
User Groups, and Forums, and Blogs, Oh My: Top 7 Linux Resources to Increase Your Expertise
By Bob Erdman on Mon, 01/14/2019
Find what you need in our compiled list of Linux resources.
On-Demand Webinar
IBM i's Great Debate: Security vs. Systems Maintenance
By Robin Tatam
How do hardware and OS upgrades affect security? Which should come first? Join this live webinar to explore the relationship between critical systems maintenance and cybersecurity.