Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Article
Message Received?
By Chuck Losinski on Fri, 02/23/2018
When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.
Guide
Download the EMA Radar™ Report for Workload Automation
Analyst firm Enterprise Management Associates (EMA) has released its latest Radar™ report for Workload Automation. The Radar report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. In this Radar report, Automate from Fortra has once again been named a Value Leader in workload automation.
Fill...
Blog
Bringing Development and Operations Together for Successful DevOps
Mon, 01/08/2018
DevOps is about close collaboration between development and operations. Learn how to facilitate DevOps in a way that benefits your business.
On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
Datasheet
Intermapper Remote Access
Intermapper Remote Access extends the reach of Intermapper by giving you and your staff access to maps, submaps, and configuration options, regardless of your location.
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
Case Study
How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Blog
How Automation Widened the Processing Window at Heartland Financial
By Chuck Losinski on Tue, 08/22/2017
IT process automation software helps Heartland Financial do processing for nine different banks in a narrow timeframe. Listen the audio Q&A!
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By Robin Tatam on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
Article
Enterprise Schedulers: Robot vs. Automate Schedule
Tue, 04/04/2017
Where do you need your enterprise scheduler to run? With Fortra solutions, IBM i and other operating systems like Windows®, Linux®, or UNIX® are all possibilities. Robot Schedule Enterprise is our IBM i-centric solution and the Automate Schedule solution centers on the other platforms.
On-Demand Webinar
Stay Connected to Your Network with Remote Monitoring
Remote network access could simplify your life and help you improve uptime. Find out why and how in this on-demand webinar.
Blog
New Trends in Workload Automation
Fri, 03/31/2017
Because IT enables competitive advantage, workload automation has had to evolve from simple job scheduling on a few mainframes to broader processes that incorporate many platforms and applications.
Article
All Systems Go: Integrating with Big Software
Fri, 03/31/2017
Your data, your job scheduling tool, your ERP system—they all must work in concert with one another to make your organization as efficient as possible in meeting your customers’ needs as well as your own innovation and production goals.
Article
Alternate Reactive Paths: Do You Have a Backup Plan?
Fri, 03/31/2017
Is your enterprise job schedule as safe as the rest of your life? The ability to set up alternate reactive paths could be the backup plan you’re looking for.
Article
Monitoring the Mayhem: Keeping Track of Your Schedule
Fri, 03/31/2017
Understand the importance of job monitoring features: how are they the difference between a schedule that runs smoothly and a schedule that runs rampant?