Article
Two-Way Message Response with Robot
By Chuck Losinski on Wed, 05/01/2019
You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Blog
How Do You Go Paperless? Tips to Help You Get Started
By Greg J. Schmidt on Thu, 04/25/2019
Find out. And if you aren’t there yet, get tips for actually going paperless.
Blog
What is Document Capture Automation and What are the Benefits?
By Richard Schoen on Fri, 04/19/2019
Learn about document capture—and why you should be automating it.
Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Datasheet
Robot Alert
Robot Alert sends and receives email, text, and SNMP messages in reaction to IBM i events.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your AIX Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
Blog
5 Quick Wins for Document Management this Year
By Richard Schoen on Tue, 01/15/2019
Do you need document management in 2019? Discover five quick wins that make it easy to get started.
Blog
User Groups, and Forums, and Blogs, Oh My: Top 7 Linux Resources to Increase Your Expertise
By Bob Erdman on Mon, 01/14/2019
Find what you need in our compiled list of Linux resources.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Why Corporate Networks are Key Targets for Cryptojacking
By Bob Erdman on Thu, 12/06/2018
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
Blog
Is There Such a Thing as Free Antivirus for Businesses?
By Bob Erdman on Tue, 11/06/2018
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
Blog
Malware, Virus, Anti-malware, Antivirus: What’s the Difference?
By Bob Erdman on Tue, 10/30/2018
Read on to find out the difference between malware and a virus, and how you can best protect your organization from them.