On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
On-Demand Webinar
Streamlining the Exchange of Secure Data
Discover tactics for simplified data management in a world of huge data volumes
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
On-Demand Webinar
Top Considerations When Selecting the Right MFT Software
By Heath Kath
If MFT’s on your IT shopping list, check out these key considerations before making that purchase.
On-Demand Webinar
10 Ways to Make IBM i File Transfers Easier
Tue, 08/10/2021
Thank you for interest in this on-demand webinar. If you have questions following the webinar, please contact us . You can also download the presentation slides here .
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it. In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps address And more! If you are curious about our...
Guide
Robot in Modern IBM i Environments
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Guide
How to Handle Explosive IBM i Storage Growth
Data growth projections are simply too big to ignore. It’s essential that IT teams move away from reactive approaches and adopt a sustainable data storage management strategy. This guide is a great resource to get you started.
On-Demand Webinar
Streamline the Day-to-Day with IT Automation
Thu, 01/14/2021
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
On-Demand Webinar
Replacing FTP Scripts with Managed File Transfer
Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide. If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other insecure, manual methods is a...
On-Demand Webinar
IASP, IFS, and Disk Analysis, Oh My!
IASP technology can revolutionize your IBM i! Watch this webinar to see it in action—and learn how to keep the disk storage it uses under the watchful eye of Robot.
On-Demand Webinar
Secure and Automate Your File Transfers for IBM i
By Heath Kath
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook , you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
On-Demand Webinar
The Keys to Securing Data in Motion
In this third-party webinar from InfoSecurity Magazine, you'll explore the five keys to securing sensitive data in motion—compliance, collaboration, encryption, secure email, and automation—and how to implement them in your organization.