-
Alan Jordan |
Greg J. Schmidt
On-Demand Webinar
Why Don't Companies Role Swap?
Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Datasheet
When to Use Robot HA, PowerHA, or Both
Discover the relationship between Fortra and IBM regarding Robot HA and PowerHA as well as when it is advantageous to use each one or both.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Product Video
How to Simplify IFS Journaling with Robot HA
Tue, 02/06/2024
Watch this demonstration of how you can simplify your IFS journaling using Robot HA.
Blog
99% of User-Related Threats Are Email Impersonation Attempts
Wed, 06/21/2023
Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating...
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
On-Demand Webinar
Discover Easy and Affordable High Availability
Watch as our IBM i experts showcase how easy it is to navigate Robot HA, the simplicity it brings to creating new rules, and why it's so affordable.
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side,...
On-Demand Webinar
How to Move from Legacy HA to Robot HA in 30 Days
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
On-Demand Webinar
Workshop: PowerHA + Robot HA
Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
On-Demand Webinar
Top 3 Reasons Why You’re Scared of Role Swaps
Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.