On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
On-Demand Webinar
8 Items to Consider When Switching ERPs
By Tim Dunn
This webinar with HarrisData and Fortra covers the eight questions to consider when you switch enterprise resource planning (ERP) systems.
Press Release
HelpSystems (now Fortra) Launches Simple Way to Integrate File Transfers with Everyday Cloud Applications
Today Fortra released Cloud Connectors allowing their GoAnywhere Secure File Transfer solution to integrate with popular third-party services like Salesforce, SharePoint, Box, and more.
Blog
What is an Electronic Document Management System (EDMS) and Why Do I Need One?
By Greg J. Schmidt on Thu, 06/14/2018
An EDMS (electronic document management system) provides a way to capture, manage, and retrieve your documents. Learn why it's time to get one.
Datasheet
Webdocs for AP
Webdocs streamlines invoice processing by capturing invoices electronically and routing them through every step of your accounts payable (AP) workflow.
On-Demand Webinar
Survey Results: Cybersecurity Risk Mitigation Strategies
By Robin Tatam
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Blog
Next Steps for Replacing IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
You know you need to replace IBM Content Manager. But you don’t know where to start…
Datasheet
Webdocs
Webdocs helps you streamline your business processes by managing the entire document lifecycle digitally. That makes it easier for everyone at your organization to get the information they need anytime, anywhere (as long as they’re authorized).
Capture Every Document
Automate the document capture process—no matter how you receive documents. With Webdocs, you can go beyond just scanning and...
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
The Three Scariest Things About NOT Going Paperless
By Bill Whalen on Wed, 03/29/2017
Are you afraid of going paperless? Overcome your fear—and learn about the frightening consequences of not going paperless.
Article
Audit Tested & Audit Approved Instant Authority!
By Robin Tatam on Fri, 03/24/2017
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
On-Demand Webinar
Getting Started with Document Management: The Right Plan
Getting started with document management doesn’t need to be complicated. Make it easy—watch this on-demand webinar.
Blog
Customer Success: Streamlining AP Invoice Capture
By Richard Schoen on Tue, 03/21/2017
AP invoice capture doesn't need to be complicated. For one of our customers, it was easy—read the blog post to learn more.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article
The Modern Alternative to Authority Adoption
By Robin Tatam on Wed, 03/08/2017
There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?