Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide.If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other...
IASP technology can revolutionize your IBM i! Watch this webinar to see it in action—and learn how to keep the disk storage it uses under the watchful eye of Robot.
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
Robot Schedule automatically and reliably runs millions of iSeries jobs for organizations all over the world every day. Watch this webinar to learn how.
In this third-party webinar from InfoSecurity Magazine, you'll explore the five keys to securing sensitive data in motion—compliance, collaboration, encryption, secure email, and automation—and how to implement them in your organization.
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.
Every IT team has a fresh face or bright star that could revitalize and revolutionize the way IT adds value to the business. But are you giving them the tools they need to succeed? Discover modern tools to help your IT team make an impact at this recorded webinar.
Most IBM i shops run Windows servers alongside IBM i. These systems rely on each other for information and—with a little help from Robot enterprise job scheduling—automation. Watch this webinar to learn more!
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
As data storage needs increase, SAN technology delivers greater flexibility. Chris Bremer, Chief Technology Officer at DSI, leads this 30-minute recorded session on what SAN is and how it works.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
Studies show that the amount of data stored worldwide will grow by 4,300% within 7 years. 80% of that growth is on enterprise servers like your IBM i. If you want to be prepared to manage that kind of big data, watch this webinar!
See firsthand the flexibility that file monitoring brings to your schedule by allowing event-driven scheduling based on file creation, deletion, and file size.