Resources

Case Study

Automating Crystal Reports with Automate Saves 20 Hours per Week for Appliance Distributor

For wholesale appliance distributor Echelon Home Products, generating and distributing reports for four different business divisions used to require at least 20 hours of weekly Crystal Reports work as well as wreak havoc among employees every Monday because of an all-day report-related network slowdown. That changed in 2008 when Echelon plugged into Automate, the robotic process automation (RPA)...
Case Study

Pacific Toxicology Laboratories Saves Time with Automate

Pacific Toxicology Laboratories (PacTox), located in Chatsworth, California, is a privately owned company that performs five distinct lab functions under one roof—drug testing, biological monitoring, medical surveillance, therapeutic drug monitoring, and forensic toxicology. PacTox's competitive advantage is its unique ability to provide integrated biological testing services. Clients include...
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Guide

Essentials for Privileged Access Management

Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide

Controlling SSH for Security and Compliance

SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Article

Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies

System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article

Managing IT Access Privileges

THE UNSOLVED PROBLEM Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges. The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID...
Article

Solving Healthcare Security Concerns

According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial fraud, there is also...
Article

New Approaches to the SWIFT and PCI-DSS Framework

THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate...
Article

Pros and Cons for Puppet's Configuration Management & Security

THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet...
Article

A Modern Approach to Performance Management

Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.
Article

Windows Azure Automation

Cloud computing, cloud storage, cloud database…we all have heard about the “cloud.” Cloud computing has gained tremendous visibility in recent years. According to research firm, Gartner, “By 2012, 80% of Fortune 1000 enterprises will be using some cloud computing services, 20% of business will own no IT assets.” In addition, small businesses are attracted to the small startup costs and lower TCO...