Resources

Article

Scheduling for the People (Not for Computers)

If you understand the capabilities of different job schedulers, you’ll know the extent to which your company would benefit from a more advanced enterprise job scheduler.
Article

Why Everyone Has a Crush on Linux—even IBM

Linux helps enterprises make IT more scalable and flexible. Supplemented by dedicated, Linux-compatible tools for job scheduling—like Automate Schedule—put organizations in a prime position to streamline operations to meet changing requirements.
Article

Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies

System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article

Managing IT Access Privileges

THE UNSOLVED PROBLEM Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges. The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID badges) that can open many-toall of the locks in the...
Article

Solving Healthcare Security Concerns

According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial fraud, there is also...
Article

New Approaches to the SWIFT and PCI-DSS Framework

THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate incident three years ago (no, you don’t want to hear...
Article

Pros and Cons for Puppet's Configuration Management & Security

THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet in their server/VM infrastructure, and are looking...
Article

Discover Automate's New Capabilities for Office 365

With the eagerly anticipated release of Microsoft’s cloud-based service, Office 365, on June 28, Network Automation immediately set to work on ensuring the current Microsoft Office automation facilities in Automate were enhanced to provide its customers with equivalent automation capabilities.
Article

AutoMate Bridges the Gap Between Disparate Applications

Automate from Fortra provides application security, streamlined communication including sending emails and text messages to IT regarding successful or failed tasks, error handling, and flexibility and versatility via its highly coveted development interface (no programming or scripting needed).
Article

mySQL and the SQL Query Action

Automate can easily interact with a mySQL server and its associated databases through the SQL Query and SQL Stored Procedure actions. The document explains how to setup a mySQL data source connection through Automate that can be used to run queries against a mySQL database.
Article

Debugging Tasks

We'll explore some of the techniques you can use to debug tasks in the Automate Task Builder. Several features available in Automate 6.1 can help make this an easier process.