Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.
Datasheet
Powertech SecurID Agent for IBM i
Powertech SecurID Agent for IBM i brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Schedule a demo today.
Datasheet
Powertech Command Security for IBM i
Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
Article
The Many Ways Robot Supports SNMP
By Chuck Losinski on Fri, 02/23/2018
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
Blog
How to Automate Security Policy Enforcement
By Robin Tatam on Wed, 10/18/2017
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Datasheet
Intermapper App for Splunk Enterprise
If you need proactive network monitoring and visual mapping, Intermapper will give you real-time knowledge of your network, affordably and with seamless integration into Splunk.
On-Demand Webinar
Report Capture and Delivery for the 21st Century
It’s time to re-think your reports. Watch the webinar to learn how to modernize report capture, management, and delivery for Windows and IBM i.
Article
Protect the IBM i Command Line with Powertech Command Security for IBM i
By Robin Tatam on Fri, 03/24/2017
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Case Study
Appvion Improves Customer Satisfaction with a Digital Document Repository
Appvion, Inc. manufactures paper—thermal, carbonless, security, inkjet, digital specialty and colored papers. But this Appleton, Wisconsin-based company had a problem when it came to digital documents in their customer web portal. Their existing system just wasn’t up to snuff. It was time to make a change.
...
Blog
The Problem with AFP Forms…
Wed, 01/25/2017
What’s wrong with AFP forms? And is it really time to replace them? Find out.
On-Demand Webinar
IBM i Meets Mobile Technology
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Article
Intermapper Application for Splunk Answers Need for Log Analytics in Network Management
By Shamus McGillicuddy on Wed, 09/07/2016
The Intermapper application for Splunk brings together Intermapper's robust network monitoring software with Splunk's high-powered searches and analysis of data stores.
Article
Continuous Performance Data—Without Big Overhead
By Chuck Losinski on Tue, 08/30/2016
There are two sides to every Robot Network. It offers centralized control of the Robot software running on your IBM i partitions as well as performance monitoring and exception-based management across your environment.
Blog
User Interfaces: GUI vs. WUI
By Tom Huntington on Tue, 08/16/2016
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
What’s New in the Robot NETWORK Web Interface?
By Chuck Losinski on Tue, 08/16/2016
Just when you were getting used to the GUI, Robot NETWORK gives its web interface a boost that makes managing your performance and Robot product metrics even easier.