Guide
DMZ Secure Gateways: Secret Weapons for Data Security
Exchanging a high workload of files with customers, employees, and trading partners is common in today's global economy. Add various data security standards to the mix, like PCI DSS, HIPAA, and the GDPR, and protecting sensitive data becomes a challenge many organizations struggle to overcome.In an effort to simplify how file transfers are retrieved, many IT teams install file sharing servers (e.g...
Guide
The Ultimate Guide to Investing in Secure File Transfer Software
We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover:The benefits...
Article
How to Download an ODBC Driver
Wed, 07/25/2018
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article
FAQs about Performance Navigator
Thu, 07/12/2018
Will this product hurt the performance of my IBM i®?
You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service.
How is Performance Navigator compared to PM?
Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
On-Demand Webinar
The Truth About Viruses on Linux
By Bob Erdman
This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar
2 True Tales of HA/DR Success on IBM i
Hear how Nesco Resource and Furuno USA use Robot HA for IBM i data replication. Watch this recorded webinar!
Article
PowerHA for SAP—A Winning Combination
By Tom Huntington on Thu, 05/31/2018
What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.
Case Study
Robot HA Keeps Nesco Resource Out of Harm’s Way
Nesco Resource is one of the leading national staffing and employment agencies offering services in temporary staffing, direct hire, and a host of other staffing and recruiting solutions. Through its 100+ branches, the Cleveland, Ohio-based company has 60,000 people annually on its paycheck roster.
...
Blog
Where to Find Work Orders When the System Goes Down
By Tom Huntington on Thu, 02/15/2018
Paper work orders are a thing of the past. But system failure could deliver a nasty surprise to manufacturers and distributors who don’t have HA in play. Read on for more.
On-Demand Webinar
Did My IBM i Just Shut Down the Shop Floor?
High availability has special implications for IBM i teams in manufacturing and distribution. Watch this webinar to learn more!
Datasheet
Robot HA
Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
On-Demand Webinar
What Is Disaster Recovery as a Service?
By Tom Horan
Tom Horan from Meridian IT shares the secret to getting started with IBM i high availability and disaster recovery in the cloud. Watch now!
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
On-Demand Webinar
IBM i Roundtable: High Availability Hot Topics
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.
On-Demand Webinar
IBM i High Availability at Fortra
Fortra has the fastest, easiest, most affordable way for you to achieve IBM i high availability or roll out DRaaS at your organization. See how!
On-Demand Webinar
Disaster-Proof Your IBM i Data
Learn the essentials to address today’s top backup and recovery concerns on IBM i from leading disaster recovery expert Debbie Saugen.