On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
Case Study
SQL SCHEDULING GOES ENTERPRISE
Company Background
Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study
SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS
Company Background
SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people.
The company’s products are widely distributed through...
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
Blog
The Four Stages of Enterprise Automation: Where Are You in the Automation Journey?
Thu, 10/18/2018
Workload automation technology is becoming increasingly sophisticated, but many businesses still haven’t automated to their full potential. Here's how to get there.
Datasheet
Powertech Identity Manager for IBM i
Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Guide
Download the EMA Radar™ Report for Workload Automation
Analyst firm Enterprise Management Associates (EMA) has released its latest Radar™ report for Workload Automation. The Radar report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. In this Radar report, Automate from Fortra has once again been named a Value Leader in workload automation.
Fill...
Blog
Bringing Development and Operations Together for Successful DevOps
Mon, 01/08/2018
DevOps is about close collaboration between development and operations. Learn how to facilitate DevOps in a way that benefits your business.
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Article
Enterprise Schedulers: Robot vs. Automate Schedule
Tue, 04/04/2017
Where do you need your enterprise scheduler to run? With Fortra solutions, IBM i and other operating systems like Windows®, Linux®, or UNIX® are all possibilities. Robot Schedule Enterprise is our IBM i-centric solution and the Automate Schedule solution centers on the other platforms.
Blog
New Trends in Workload Automation
Fri, 03/31/2017
Because IT enables competitive advantage, workload automation has had to evolve from simple job scheduling on a few mainframes to broader processes that incorporate many platforms and applications.
Article
Alternate Reactive Paths: Do You Have a Backup Plan?
Fri, 03/31/2017
Is your enterprise job schedule as safe as the rest of your life? The ability to set up alternate reactive paths could be the backup plan you’re looking for.
Article
All Systems Go: Integrating with Big Software
Fri, 03/31/2017
Your data, your job scheduling tool, your ERP system—they all must work in concert with one another to make your organization as efficient as possible in meeting your customers’ needs as well as your own innovation and production goals.
Article
Linux on Power Systems and Automate Schedule: Why They Work Together
Fri, 03/31/2017
Whether you’re running Linux on multiple partitions, running multiple operating systems on your Power systems, or running production job streams across those partitions, Automate Schedule can help you manage your workflows on Power servers running Linux.
Article
Monitoring the Mayhem: Keeping Track of Your Schedule
Fri, 03/31/2017
Understand the importance of job monitoring features: how are they the difference between a schedule that runs smoothly and a schedule that runs rampant?