Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
On-Demand Webinar
Top Considerations When Selecting the Right MFT Software
By Heath Kath
If MFT’s on your IT shopping list, check out these key considerations before making that purchase.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Article
Where Does CPU Go When It’s Missing?
By Kurt Thomas on Thu, 10/07/2021
Have you ever noticed that the CPU used by individual jobs does not add up to 100 percent? As it turns out, your jobs and subsystems are only part of the story. For the stunning conclusion, we return you to the Licensed Internal Code (LIC).
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
On-Demand Webinar
10 Ways to Make IBM i File Transfers Easier
Tue, 08/10/2021
Thank you for interest in this on-demand webinar. If you have questions following the webinar, please contact us. You can also download the presentation slides here....
Blog
Open PGP for IBM i (iSeries)
Tue, 08/10/2021
GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus.
With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...
Blog
IBM i MFT for Secure FTP and PGP
Tue, 08/10/2021
GoAnywhere MFT will automate and secure file transfers on the IBM i platform using Secure FTP, Open PGP and other popular protocols and encryption standards.
GoAnywhere's IBM MFT can be installed on IBM iSeries - version 7.1 and higher on IBM Power Systems, as well as many other operating systems.
Automates and secures file transfers with trading partners, customers and internal servers
...
Blog
Think Mutual Bank Uses GoAnywhere MFT for Robust Features and PCI DSS Compliance
Tue, 08/10/2021
Industry: Banking and Finance
About a year ago, Think Mutual Bank, a bank located in the Midwest, was searching for a way to transfer data between disparate banking systems. Although Think Bank’s core system is the IBM i, the business banking segment runs on MS SQL. Getting all the data into one place (the IBM i), then copying updated files back to the MS SQL system was a challenge that had to be...
Blog
The State of Maryland DLLR Secures and Simplifies File Transfers with GoAnywhere
Tue, 08/10/2021
Maryland’s Department of Labor, Licensing, and Regulation (DLLR) must transfer sensitive data in a secure and reliable fashion. Besides the challenge of ensuring information is protected in transit, each DLLR trading partner requires information to be sent in different file formats, such as fixed width, Excel, CSV, or XML.
The DLLR chose GoAnywhere to meet their growing file transfer needs and...
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i
By Brian Pick on Tue, 06/29/2021
Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be...
On-Demand Webinar
Application Monitoring from Every Angle
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
Article
Adding Flexibility to IBM i Monitoring Without Compromising Availability
By Kurt Thomas on Tue, 06/01/2021
To cope with system issues, you want easy yet comprehensive solutions that handle your performance, messaging, and remote management needs, but what you really need are integrated solutions for universal control. See where Robot Monitor fits in.
Article
Application and Resource Issues: No More Hunting & Fishing on IBM i
By Kurt Thomas on Tue, 06/01/2021
Use a real-time monitoring tool with thresholds and drill-down capabilities to speed root cause analysis and problem determination for application and resource performance issues on IBM i.
Article
Job Status and Other Stories About Application Monitoring
By Kurt Thomas on Tue, 06/01/2021
Knowing a job’s CPU usage, disk I/O, temporary storage, and so on is fine, but what you really want to know is how the job is doing. And we can see a job's status on IBM i. Here's how.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...