Resources

On-Demand Webinar

JAMS Feature Tour

Join Robert Newman for this condensed feature tour!
Article

Mobile NOW for Robot Network

The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Article

Mobile Dashboards for IBM i Monitoring

Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
Case Study

SQL SCHEDULING GOES ENTERPRISE

Company Background Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study

SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS

Company Background SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people. The company’s products are widely distributed through...
Datasheet

Powertech Encryption for IBM i

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Datasheet

Powertech Encryption for IBM i Compliance Datasheet

Satisfy Stringent Requirements for Encryption and Key Management Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Guide

Download "IBM i Encryption: How to Protect Your Database"

Learn your options for encrypting IBM i data. Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property. Encryption is widely recognized as the most effective way to ensure private...