Resources

Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world...
On-Demand Webinar

VTL Save Strategies on IBM i

Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
On-Demand Webinar

Introduction to FlashCopy

Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.
On-Demand Webinar

Job Scheduling: Basic to Advanced

Fortra offers two automation platforms to handle the complex scheduling needs of modern enterprises: AutoMate and Skybot. Join this live webinar to learn about using these solutions to orchestrate processes from the server down to the user’s desktop.
On-Demand Webinar

Practical Task Scheduling Deployment

One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of...
Blog

Job Scheduling: Basic to Advanced (Webinar Recap)

As IT environments become increasingly complex, so do a business's job scheduling needs. Learn how Fortra job scheduling and robotic process automation solutions can help you streamline your unique IT processes.
Article

4 Reasons to Add VTLs

Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.