SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
When is the right time to rely on an Option 21 save and when should I turn to an enterprise-class solution like BRMS or Robot Save? Read on to find out.
Enterprise IT automation that leverages a strategic approach helps manage diverse automation tools and solutions holistically. Learn more about the key principles to embrace for holistic enterprise IT automation.
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
Optimizing and orchestrating IT automation across a complex, diverse infrastructure requires the right vision—and the right partner—to centralize your workflows and support critical business processes. As organizations embrace digital transformation, they’re finding a new set of challenges holding them back from true change—from juggling multiple unmanageable tools to finding...
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
During this 1-hour session, Fortra and LaserVault experts join forces to discuss the merits of virtual tape and show you how VTL technology can replace your traditional tape backups.
If you believe nothing important is stored on your server's IFS, think again, because it's a conduit to many things, including the Operating System and all of your application libraries and files.
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Watch this on-demand webinar to learn more about front-end and back-end automation and how to better craft a winning automation strategy that takes advantage of each approach to automation.
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.