Resources

Guide

A Guide to IBM i Message Management

This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z,...
Article

Mobile NOW for Robot Network

The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included...
Article

The Many Ways Robot Supports SNMP

Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
On-Demand Webinar

Deploying Multi-Factor Authentication in Your Enterprise

Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense. MFA protects you from the most common cause of a data...
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the...
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.