Streamline the Day-to-Day with IT Automation
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Automating Your Microsoft Applications with RPA
By Pat Cameron on Thu, 12/10/2020
If your business relies on Microsoft applications like Excel, Word, SharePoint, Active Directory, and others, you could be saving hours by automating. Watch this webinar to learn how to easily automate your Microsoft applications with robotic process automation.
Halcyon IBM i Server Suite Level 2 for Beginners
Watch this webinar to learn what every beginner should know about Halcyon IBM i Server Suite Level 2 for Beginners monitoring software for IBM i (AS/400, iSeries).
Watch a Demo of Powertech Antivirus
Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and PowerLinux...
The Power of 24/7 Network Monitoring for Government Entities
By Kevin Jackson on Thu, 11/19/2020
Keeping a 24/7 eye on network performance to support critical government initiatives requires powerful networking monitoring software. View this on-demand webinar to learn how a powerful network monitoring solution like Intermapper can help you see the full picture of network health and stay one step ahead of network issues.
Panel Discussion: Your IBM i Security Action Plan
By Tom Huntington on Wed, 11/18/2020
When your to-do list is a mile long, security might not bubble to the top—unless and until something catastrophic happens. But dealing with a cybersecurity catastrophe is far more time-consuming (and expensive) than a proactive approach. Join the Fortra team of IBM i security experts for a discussion geared to help you take concrete steps toward improving your IBM i security posture. They’ll cover...
How to Work with Data from IBM i and Remote Databases
By Greg J. Schmidt on Tue, 11/17/2020
Watch this webinar to get insights from our expert on bringing data all together into one solution and work with it easily.
Evaluating Opportunities for Front-End and Back-End Automation
By Pat Cameron on Mon, 11/09/2020
Watch this on-demand webinar to learn more about front-end and back-end automation and how to better craft a winning automation strategy that takes advantage of each approach to automation.
Roundtable: Have You Heard This IBM i Horror Story?
By Tom Huntington on Thu, 10/29/2020
Watch this hair-raising hour where our expert panel shares real-life horror stories heard from customers sites around the world—anonymously, of course.
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore on Thu, 10/15/2020
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.