On-Demand Webinar
The Truth About Viruses on Linux
By Bob Erdman
This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar
2 True Tales of HA/DR Success on IBM i
Hear how Nesco Resource and Furuno USA use Robot HA for IBM i data replication. Watch this recorded webinar!
Article
PowerHA for SAP—A Winning Combination
By Tom Huntington on Thu, 05/31/2018
What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.
Case Study
Robot HA Keeps Nesco Resource Out of Harm’s Way
Nesco Resource is one of the leading national staffing and employment agencies offering services in temporary staffing, direct hire, and a host of other staffing and recruiting solutions. Through its 100+ branches, the Cleveland, Ohio-based company has 60,000 people annually on its paycheck roster.
Blog
Where to Find Work Orders When the System Goes Down
By Tom Huntington on Thu, 02/15/2018
Paper work orders are a thing of the past. But system failure could deliver a nasty surprise to manufacturers and distributors who don’t have HA in play. Read on for more.
On-Demand Webinar
Did My IBM i Just Shut Down the Shop Floor?
High availability has special implications for IBM i teams in manufacturing and distribution. Watch this webinar to learn more!
Datasheet
MQ Manager
MQ Manager continuously and automatically monitors the seven key components of IBM MQ in order to ensure the flow of data is not disrupted, prevent costly downtime, free up IT resources and reduce operational cost.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
On-Demand Webinar
What Is Disaster Recovery as a Service?
By Tom Horan
Tom Horan from Meridian IT shares the secret to getting started with IBM i high availability and disaster recovery in the cloud. Watch now!
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Article
6 Enhancements in IBM i Server Suites Version 7
By Paul Ratchford on Fri, 06/23/2017
What's new in version 7 of IBM i Server Suites? Read this article to find out.
On-Demand Webinar
IBM i Roundtable: High Availability Hot Topics
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.
On-Demand Webinar
IBM i High Availability at Fortra
Fortra has the fastest, easiest, most affordable way for you to achieve IBM i high availability or roll out DRaaS at your organization. See how!
Article
Seven Key Components of IBM WebSphere MQ and What to Watch
By Seven Key Components of IBM WebSphere MQ and What to Watch on Wed, 05/10/2017
Minimize business risk by ensuring that the flow of critical data is not interrupted. Learn what you should be monitoring in IBM WebSphere MQ.
On-Demand Webinar
Disaster-Proof Your IBM i Data
Learn the essentials to address today’s top backup and recovery concerns on IBM i from leading disaster recovery expert Debbie Saugen.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Article
How Recoverable Is My IBM i?
By Tom Huntington on Thu, 02/09/2017
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world consequences...