Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
On-Demand Webinar
Control Costs and Boost Productivity with IBM i Automation
Tue, 03/19/2024
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Guide
How to Get Started with IT Modernization
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
The Changing Role of Government in Cybersecurity
By Antonio Sanchez on Wed, 11/29/2023
Governments are responsible for carrying out their duties to defend the rights and safety of their citizens. Find out their role in the cyber landscape and how Fortra plays a part.
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Guide
2023 Domain Impersonation Report
Current Domain Threats, Trends, and Techniques
Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal.
In the 2023 Domain Impersonation Report, we review look-alike domain...
Guide
Preventing Domain Impersonation
How to Stop Look-Alike Domains and Spoofing
In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.
It’s crucial that companies take preventive measures against look-alike...
On-Demand Webinar
The Safe and Secure Replacement for RUNRMTCMD
IBM stopped supporting the critical RUNRMTCMD due to security concerns. Watch this recorded session where our experts reveal how Robot Schedule Enterprise replaces RUNRMTCMD safely and securely.
On-Demand Webinar
Ten Job Scheduling Features Your IBM i Can’t Live Without
Watch this recorded session to learn which Robot Schedule job scheduling features are considered the most crucial to your IBM i's success and why.
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
On-Demand Webinar
IBM i Automation Series: Job Scheduling
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
Blog
What is the Data Security Lifecycle?
By Brian Pick on Tue, 01/18/2022
What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
Datasheet
SFT Threat Protection
Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.