On-Demand Webinar
Introduction to Workload Automation
Tue, 11/10/2020
Join our technical team for a 45-minute on-demand webinar to jump start your workload automation skills.
On-Demand Webinar
Encryption on IBM i Simplified
By Robin Tatam
DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
On-Demand Webinar
Automating AP with Completely Paperless Invoice Processing
A comprehensive Accounts Payable document solution will improve your data integrity, speed up your document routing, and make payment processing painless.
Guide
Download the Workload Automation Buyer's Guide
Your First Step Towards Purchasing a Workload Automation Solution
We know finding the right workload automation solution for your organization isn’t an easy process. There are dozens of details to consider, from 3rd party integrations, to job monitoring and security concerns, that can make choosing a vendor complex.
In this ultimate buyer’s guide, you’ll find the information you need to...
Guide
5 Benefits of Automation: The Advantages of Automation
Learn more about the advantages of automation in business.
On-Demand Webinar
JAMS Feature Tour
Wed, 12/04/2019
Join Robert Newman for this condensed feature tour!
On-Demand Webinar
How to Take a Planned Approach to Document and Forms Management for AP
Watch our on-demand webinar to learn the smartest way to implement document and forms management solutions for Accounts Payable (AP).
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
On-Demand Webinar
How to Meet the Newest Encryption Requirements on IBM i
By Robin Tatam
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity. But how do you meet encryption mandates on IBM i?
Case Study
SQL SCHEDULING GOES ENTERPRISE
Company Background
Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study
SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS
Company Background
SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people.
The company’s products are widely distributed through...
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
Blog
The Four Stages of Enterprise Automation: Where Are You in the Automation Journey?
Thu, 10/18/2018
Workload automation technology is becoming increasingly sophisticated, but many businesses still haven’t automated to their full potential. Here's how to get there.
Datasheet
Powertech Encryption for IBM i
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.