Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
Blog
How Automation Widened the Processing Window at Heartland Financial
By Chuck Losinski on Tue, 08/22/2017
IT process automation software helps Heartland Financial do processing for nine different banks in a narrow timeframe. Listen the audio Q&A!
Article
How to Automate Report Balancing Across Windows and IBM i Servers
By Chuck Losinski on Fri, 06/02/2017
Watch this short video to see how easy report balancing can be when using our integrated solution of Robot Schedule Enterprise and Automate.
On-Demand Webinar
Modern IBM i Tools for Modern IT Teams
Every IT team has a fresh face or bright star that could revitalize and revolutionize the way IT adds value to the business. But are you giving them the tools they need to succeed? Discover modern tools to help your IT team make an impact at this recorded webinar.
Blog
What Modern Process Automation Looks Like at Lamps Plus
By Chuck Losinski on Thu, 05/18/2017
Lamps Plus cut 20 hours of overtime out of each week using modern process automation tools to streamline point of sale transactions. Listen to the audio Q&A!
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
On-Demand Webinar
What Happens When IBM i Enters the Windows World
Most IBM i shops run Windows servers alongside IBM i. These systems rely on each other for information and—with a little help from Robot enterprise job scheduling—automation. Watch this webinar to learn more!
Article
Top Ten Reasons GUI Tops Green Screen
By Chuck Losinski on Mon, 04/17/2017
Attention green screen users: Going to a GUI is not just change for change’s sake, and it’s easier than you think.
Blog
Compare Powertech Encryption for IBM i to IBM's Cryptographic APIs for Encrypting Database Fields
By Bob Luebbe on Fri, 03/17/2017
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Case Study
Hershey Entertainment Quickly Encrypts Credit Card Data with Powertech Encryption for IBM i
Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...
Case Study
Field-level Encryption Helps Retail Chain Achieve PCI Compliance
Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors.
“We need to be able to access credit card...
Article
Secret Capabilities of Robot Schedule Revealed
By Chuck Losinski on Tue, 01/31/2017
We recently surveyed our Robot Schedule technical support group for “ah ha!” moments that they’ve helped customers realize over the past few years. These tips from our tech gurus have helped customers automate jobs that needed to check a data area before running, track non-Robot jobs for reporting purposes, and check the status of a file before running a job.
Article
Customer Spotlight: Heartland Financial USA, Inc.
By Chuck Losinski on Tue, 01/17/2017
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
On-Demand Webinar
Enterprise Job Scheduling Makes Your Job More Manageable
Automated job schedulers should make all the jobs in your environment more manageable, including your own.
On-Demand Webinar
Next Generation Job Scheduling
Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
On-Demand Webinar
IBM i Meets Mobile Technology
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
On-Demand Webinar
Execute Sequel Scripts and Reports Automatically—with Robot Schedule
Learn how to turn your Sequel scripts and reports into an automated job stream.