Resources

News Article

Investopedia: How to Report Identity Theft

What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Case Study

For Centralized Data Processing, KeHE Relies on Fortra

As the nation’s leading distributor of natural, organic, specialty, ethnic, and gourmet food products, KeHE Distributors has helped thousands of retailers—from the smallest independent stores to the largest supermarket chains—meet the constantly growing demand for products that help people to live well. John Kinnaird is the National Operating Center Manager responsible for supporting both...