On-Demand Webinar
Robot HA in PowerHA Environments
PowerHA is robust, but it may not cover all your bases—SYSBAS, that is! Watch this webinar and learn how to replicate data and applications in SYSBAS.
Article
Audit for Role Swap Readiness with Robot HA
By Tom Huntington on Fri, 03/15/2019
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
On-Demand Webinar
Virtualization Considerations for POWER9 Hardware Changes
Watch this webinar and learn how to monitor and replicate your virtualized IBM i environment using Robot Monitor and Robot HA.
Datasheet
Powertech Antivirus for IBM i
Native Protection for IBM i
Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus.
Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Datasheet
Powertech Command Security for IBM i
Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
On-Demand Webinar
2 True Tales of HA/DR Success on IBM i
Hear how Nesco Resource and Furuno USA use Robot HA for IBM i data replication. Watch this recorded webinar!
Article
PowerHA for SAP—A Winning Combination
By Tom Huntington on Thu, 05/31/2018
What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.
Case Study
Robot HA Keeps Nesco Resource Out of Harm’s Way
Nesco Resource is one of the leading national staffing and employment agencies offering services in temporary staffing, direct hire, and a host of other staffing and recruiting solutions. Through its 100+ branches, the Cleveland, Ohio-based company has 60,000 people annually on its paycheck roster.
...
Blog
Where to Find Work Orders When the System Goes Down
By Tom Huntington on Thu, 02/15/2018
Paper work orders are a thing of the past. But system failure could deliver a nasty surprise to manufacturers and distributors who don’t have HA in play. Read on for more.
On-Demand Webinar
Did My IBM i Just Shut Down the Shop Floor?
High availability has special implications for IBM i teams in manufacturing and distribution. Watch this webinar to learn more!
Datasheet
Robot HA
Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
On-Demand Webinar
What Is Disaster Recovery as a Service?
By Tom Horan
Tom Horan from Meridian IT shares the secret to getting started with IBM i high availability and disaster recovery in the cloud. Watch now!
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
On-Demand Webinar
IBM i Roundtable: High Availability Hot Topics
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.
On-Demand Webinar
IBM i High Availability at Fortra
Fortra has the fastest, easiest, most affordable way for you to achieve IBM i high availability or roll out DRaaS at your organization. See how!
Article
Protect the IBM i Command Line with Powertech Command Security for IBM i
By Robin Tatam on Fri, 03/24/2017
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Blog
Building a Better Virus Trap
By Sandi Moore on Fri, 03/10/2017
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.