Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Article
IBM on IASP for PowerHA Implementations
By Chuck Losinski on Tue, 03/03/2020
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article
FlashCopy: Pros and Cons
By Tom Huntington on Wed, 02/26/2020
IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Blog
IBM i Data Replication: Hardware vs. Software
By Tom Huntington on Mon, 02/17/2020
There are a lot of options out there for IBM i data replication. We’ll help you weigh the options as your put together the pieces of your high availability plan.
Blog
What's New with High Availability at Fortra?
By Timothy Prickett Morgan on Wed, 11/20/2019
In this interview, IT Jungle's Timothy Prickett Morgan connects with Fortra to get an update on the company’s high availability offerings for IBM i. Read on.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How to Meet the Newest Encryption Requirements on IBM i
By Robin Tatam
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity. But how do you meet encryption mandates on IBM i?
Blog
What Does Db2 Mirror for i Mean for Me?
By Tom Huntington on Wed, 07/10/2019
Take a look at the strengths and weaknesses of IBM’s Db2 Mirror for i and determine how Fortra solutions complement this tool and can further enhance your experience.
On-Demand Webinar
Easy IBM i Migrations with Near-Zero Downtime
Upgrading your IBM Power Systems hardware? Robot HA can help you migrate your IBM i data with little to no downtime. Learn how here!
On-Demand Webinar
Robot HA in PowerHA Environments
PowerHA is robust, but it may not cover all your bases—SYSBAS, that is! Watch this webinar and learn how to replicate data and applications in SYSBAS.
Article
Audit for Role Swap Readiness with Robot HA
By Tom Huntington on Fri, 03/15/2019
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
On-Demand Webinar
Virtualization Considerations for POWER9 Hardware Changes
Watch this webinar and learn how to monitor and replicate your virtualized IBM i environment using Robot Monitor and Robot HA.
Datasheet
Powertech Compliance Monitor for IBM i
Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Schedule a demo today.
Datasheet
Powertech Encryption for IBM i
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
On-Demand Webinar
2 True Tales of HA/DR Success on IBM i
Hear how Nesco Resource and Furuno USA use Robot HA for IBM i data replication. Watch this recorded webinar!