The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
You want to manage your Robot software solutions and get a high-level look at performance metrics from a single view. Robot Network gives you the one-stop management you’ve been searching for.
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
This webinar provides an overview of Intermapper Flows, the integrated network bandwidth monitoring tool within Intermapper that provides you with real-time information on the full activity of your network.
Intermapper Flows is a particularly valuable tool for monitoring network traffic as it gives you detailed metrics about who, how, and when data is flowing across the network.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Get a complete overview of the benefits and features of Intermapper Flows, a NetFlow analyzer that works helps you identify bandwidth hogs and traffic congestion.
Intermapper 6.1 makes detecting new devices easier, more accurate, and faster than ever. Get a full review of Intermapper 6.1’s features and how to try them out.