Blog
3 Components of a Proactive Security Strategy
By Mieng Lim on Mon, 07/22/2024
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
On-Demand Webinar
Control Costs and Boost Productivity with IBM i Automation
Tue, 03/19/2024
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Guide
How to Get Started with IT Modernization
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
On-Demand Webinar
The Safe and Secure Replacement for RUNRMTCMD
IBM stopped supporting the critical RUNRMTCMD due to security concerns. Watch this recorded session where our experts reveal how Robot Schedule Enterprise replaces RUNRMTCMD safely and securely.
On-Demand Webinar
Ten Job Scheduling Features Your IBM i Can’t Live Without
Watch this recorded session to learn which Robot Schedule job scheduling features are considered the most crucial to your IBM i's success and why.
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
On-Demand Webinar
IBM i Automation Series: Job Scheduling
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
Case Study
Summit Credit Union Transforms Mortgage Department with RPA
Summit Credit Union turned to mortgage process automation from Automate to connect Blend and Mortgage Cadence to achieve a streamlined mortgage application process.
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
On-Demand Webinar
How to Convert from AJS or WRKJOBSCDE to Robot Schedule with Ease
Today’s IT teams need automation tools that can help them plan for tomorrow instead of playing catch-up. In this recorded webinar, IBM i experts introduce you to the final phase of your automation evolution: Robot Schedule.
Article
How Legacy Processing in IT Leads to Downtime on IBM i
By Tom Huntington on Mon, 10/25/2021
Why haven’t IT processes kept pace with business changes? Why are you still suffering from downtime as the result of human error? Read this article to see how legacy processing methods are still leading to downtime today—and what you can do to stop it.
Guide
Time to Replace Legacy AS/400 Schedulers?
This guide explores the limitations of legacy AS400 schedulers, identifies the signs that it’s time for a change, and points to the benefits of automated operations using modern workload automation software built for IBM i.