On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
On-Demand Webinar
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
Article
How Do I Make My Work on IBM i Look Good So My Company Doesn’t Ditch the Platform?
By Donnie MacColl on Wed, 09/11/2019
The good old green screen is no longer your safety blanket. In fact, it could be the final nail in the coffin for IBM i at your company. Consider this your wakeup call from Donnie MacColl.
Article
Mobile NOW for Robot Network
By Chuck Losinski on Wed, 08/21/2019
The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Article
Mobile Dashboards for IBM i Monitoring
By Chuck Losinski on Wed, 08/07/2019
Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Article
Mobile Management for Your Job Schedule
By Chuck Losinski on Wed, 02/13/2019
Your job schedule has never looked so good! Learn about four must-have features exclusive to the web interface for Robot Schedule.
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
Datasheet
Powertech Multi-Factor Authentication
Powertech Multi-Factor Authentication is a robust MFA solution for IBM i (AS/400, iSeries), it is a simple and effective way to ensure the users accessing your systems are who they say they are. Schedule a demo today.
Datasheet
Powertech Multi-Factor Authentication Compliance Datasheet
Comply with Security Standards, Including PCI DSS
The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By Robin Tatam on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
On-Demand Webinar
Top Tips to Increase Programmer Productivity
By Heath Kath
You don’t need to be reminded that your time is valuable. Redundant processes, fumbling between programs, struggling to set up and test time-sensitive apps all require time that you could be spending in much more productive ways.
In this session, we’ll show you how Abstract helps you eliminate busy work and streamline the development process. We’ll also explore how Anydate allows user jobs or...
Article
A Modern Approach to Performance Management
Wed, 08/24/2016
Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.