Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more. The topics...
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
Robot Reports extracts spool file data and uses it to build customized reports that can then be electronically distributed to stakeholders, accessed and viewed via a browser, and securely stored and organized. Watch this video for an overview and demonstration of how Robot Reports works.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Watch as IBM i experts Tom Huntington and Chuck Losinski discuss best practices for message management on your IBM i. They’ll break down each step in the process and provide you with a range of message management options.
IBM stopped supporting the critical RUNRMTCMD due to security concerns. Watch this recorded session where our experts reveal how Robot Schedule Enterprise replaces RUNRMTCMD safely and securely.
Stay ahead of the IBM i curve and watch this webinar to understand the recent IBM market trends and technology launches and how they affect your IBM i.
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.
Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that...
Fortra Vulnerability Management (formerly Frontline VM™ ) and Core Impact are two robust security tools designed to evaluate business critical networks and infrastructure for security vulnerabilities. Though both tools work to identify and prioritize security weaknesses, each offers unique strengths and distinct features. Fortra VM is a SaaS vulnerability management solution , mostly used for...
Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features. Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.