Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Article
IBM on IASP for PowerHA Implementations
By Chuck Losinski on Tue, 03/03/2020
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Blog
30 Ways to Simplify Life with Advanced Workflows
By Brian Pick on Thu, 02/27/2020
Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
JAMS Feature Tour
Wed, 12/04/2019
Join Robert Newman for this condensed feature tour!
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.
Article
When Should You Replace Your Free SIEM Tools?
By Bob Erdman on Wed, 11/06/2019
Free SIEM tools often come with limitations that will lead security teams to consider commercial options. How do you know when it’s time to upgrade?
Blog
Why Should You Delete Journal Receivers?
By Tom Huntington on Thu, 10/17/2019
Excessive disk space usage causes your IBM i (iSeries, AS/400) backups and disk reporting to take longer. It's best practice to automate clean-up for your journal receivers. Here's how.
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?
I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis.
Visit this page to get access to the...
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
On-Demand Webinar
Replacing FTP Scripts with Managed File Transfer
Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide.
If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other...