Resources

Guide

DMZ Secure Gateways: Secret Weapons for Data Security

Exchanging a high workload of files with customers, employees, and trading partners is common in today's global economy. Add various data security standards to the mix, like PCI DSS, HIPAA, and the GDPR, and protecting sensitive data becomes a challenge many organizations struggle to overcome. In an effort to simplify how file transfers are retrieved, many IT teams install file sharing servers (e...
Guide

The Ultimate Guide to Investing in Secure File Transfer Software

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover: The...
Guide

Choosing the Right SIEM Solution to Face Today's Security Challenges

What Makes a SIEM Solution Effective? SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind. Given the immense benefits and an increase in the number of SIEM...
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
On-Demand Webinar

The Virtualization Blind Spot

75 percent of IBM i shops run multiple partitions per server. But what aren't they seeing? Watch now and learn how to monitor virtualized IBM i environments with Robot Monitor.
Case Study

Robot HA Keeps Nesco Resource Out of Harm’s Way

Nesco Resource is one of the leading national staffing and employment agencies offering services in temporary staffing, direct hire, and a host of other staffing and recruiting solutions. Through its 100+ branches, the Cleveland, Ohio-based company has 60,000 people annually on its paycheck roster. ...
Article

The Many Ways Robot Supports SNMP

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Datasheet

Robot Monitor

Robot Monitor allows you to monitor and investigate issues on your IBM i and AIX operating systems, so you can resolve issues before they escalate and plan for future needs by tracking and analyzing past performance trends.
Datasheet

Robot HA

Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.