On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
Article
Mobile NOW for Robot Network
By Chuck Losinski on Wed, 08/21/2019
The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Datasheet
Robot Network
You want to manage your Robot software solutions and get a high-level look at performance metrics from a single view. Robot Network gives you the one-stop management you’ve been searching for.
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.
Blog
A Simple Way to Enforce Password Best Practices on IBM i
Tue, 10/16/2018
Password guidelines have changed. Learn how the new rules affect IBM i and find out how a simple tool can make it easier to enforce a strong IBM i password policy at your organization.
Datasheet
Powertech Password Self Help for IBM i
Powertech Password Self Help for IBM i enables users to reset their own IBM i passwords immediately, improving user productivity and reducing the demand placed on IT. Schedule a demo today.
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Datasheet
VCM
VCM allows you to get insight into your hybrid IT infrastructure, eliminate wasted spend, and prevent problems before they occur.
Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
On-Demand Webinar
A Shockingly Easy Way to Save Money with IBM i Passwords
By Robin Tatam
When users are unable to sign on to IBM i, productivity stops. Watch this on-demand webinar to learn a simple way to get IBM i users back to work when passwords are forgotten or entered incorrectly.
Blog
NIST’s Surprising New Password Recommendation
By Robin Tatam on Fri, 01/05/2018
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog
Faster and Easier IBM i Password Resets
By Robin Tatam on Wed, 11/08/2017
Security expert Robin Tatam explains an easy way to spend less time and resources on resetting IBM i passwords.
Guide
Powertech Password Self Help for IBM i: Self-Service Password Reset
Resetting disabled passwords is an inevitable activity. Read this guide to find out you can reduce password management costs and increase efficiency with an easy-to-use tool that allows IBM i users to reset their own passwords.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
On-Demand Webinar
Top Tips to Increase Programmer Productivity
By Heath Kath
You don’t need to be reminded that your time is valuable. Redundant processes, fumbling between programs, struggling to set up and test time-sensitive apps all require time that you could be spending in much more productive ways.
In this session, we’ll show you how Abstract helps you eliminate busy work and streamline the development process. We’ll also explore how Anydate allows user jobs or...