On-Demand Webinar
Transform Accounts Payable Processes with Intelligent Automation
By EJ Stanley
Whether your data is structured (from a spreadsheet, database, or portal), or unstructured (from emails, forms, and invoices), we’ll show you how an intelligent capture solution can transform your AP processes to save your team hours of manual work, cut back on errors, and save money by avoiding duplicate, late or overcharged invoices.
On-Demand Webinar
Intelligent Automation: The Smartest Way to Automate
Thu, 07/22/2021
Robotic process automation (RPA) is great for handling repetitive manual tasks, but what about tasks involving data that require more critical thinking? Turn to Intelligent Automation (IA). Discover how IA uses machine learning and other cutting-edge technology to take the pain out of data classification and analysis.
Whether your data is structured (from a spreadsheet, database, or portal),...
On-Demand Webinar
Get More Control Over Your Data with Intelligent Automation
Fri, 04/30/2021
Learn how your organization can use intelligent automation to maintain control of critical information with more speed and accuracy in this on-demand webinar.
On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons
Tue, 07/16/2019
Explore the changes in the way systems are deployed, and get a current view of Privileged Access Management in a world without passwords.
On-Demand Webinar
6 RDi Tutorials in 60 Minutes
How do RDi experts like Susan Gantner and Charlie Guarino use Rational Developer for i for modern RPG development? Watch now to see how!
Product Video
Watch a Demo of Core Privileged Access Manager (BoKS)
Transform your server environment into one streamlined managed security domain.
Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
On-Demand Webinar
Enabling responsible Privileged Access Management: A Fortra Discussion with Enterprise Management Associates
By Steve Brasen
Join Steve Brasen, Research Director with leading analyst firm, Enterprise Management Associates (EMA), and David Dingwall, Senior Cybersecurity Strategist with Fortra, for an informative discussion on the requirements and best practices for enabling a responsible approach to Privileged Access Management.
On-Demand Webinar
Determining the Best Approach to PAM for You
Tue, 10/23/2018
David Dingwall provides an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.
On-Demand Webinar
The Effects of Cloud Migration on IAM, PAM, and Audit
Tue, 09/18/2018
With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
On-Demand Webinar
Privileged Access Management for Linux, UNIX, and AIX Professionals
Learn how to protect your systems and data with a single solution that delivers granular security controls, automated workflows, and enables limitless scalability.
Guide
Essentials for Privileged Access Management
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide
Our Privileged Access Management Solution - Your Sudo Replacement
Learn how to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce administration efforts with an effective privileged access management solution.