I Have All Object Authority and I’m Not Afraid to Use It!
By Amy Williams
In this webinar, security expert Amy Williams explores best practices for All Object authority and strategies for correcting this vulnerability.
What's Trending in Document and Forms Management?
Discover the latest trends that are rising to the top for document and forms management. Learn what’s in store for 2022—especially around digital transformation and automation. As these key themes become critical to organizational survival and growth, learn how they’re here to stay through 2022 and beyond.
Reducing Risk Through Automated Forecasting and Planning
By aligning the management and planning of your IT resources with the business processes they support, you can provide more reliable and consistent service quality. But to achieve this, you need tools that can reliably give you maximum visibility into your IT assets. With IT performance optimization software from Vityl Capacity Management and network monitoring from Intermapper you can automate...
Step Into Easier Automation with the Automate Recorder
The Automate Recorder allows you to easily and reliably build automation. Built for real-world processes, you can quickly record tasks and fit them into already created Automate workflows. Watch and follow along to this lab-like session for a step-by-step tutorial as we cover the basics on how to create recordings for functional bots. You’ll see what makes our recorder unique from others on the...
Automate Customer Update
As your trusted partner on the automation journey, we’re excited to share the new ways we’re adding more value to Automate to help you increase your ROI. We’ve been working hard to improve our web automation capabilities so you can more easily and reliably build automation—and in half the time. In this customer exclusive webinar, you’ll get a tour of the newly released Automate 11.6—featuring the...
Protecting Mission-Critical Systems from Modern Malware Threats
By Bob Erdman
Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware can just as easily target your servers, both on-premise and in the cloud. As malware and ransomware attacks have grown, so have the number of compliance mandates—and yet many organizations are still getting breached. Join this webinar with Bob Erdman, cybersecurity expert and Associate Director of...
Survival of the Fittest: Defending IBM i Against a Cyber Attack
By Robin Tatam
Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses? The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details. In this webinar, IBM i...
Malware on Power Systems Servers: Breaking Down the Myths
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
10 Ways to Make IBM i File Transfers Easier
Thank you for interest in this on-demand webinar. If you have questions following the webinar, please contact us . You can also download the presentation slides here .
Secure and Automate Your File Transfers for IBM i
Thank you for viewing for this on-demand webinar. If you have questions following the webinar, please contact us . You can also download the presentation slides here . About the Webinar Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not riddled with meticulous details. From scripting knowledge to running commands, there’s a...