Resources

On-Demand Webinar

Simple Strategies for Malware Defense on IBM i - presented with COMMON

With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux. Watch this webinar to learn about advanced malware threats and simple...
On-Demand Webinar

Top 3 Reasons Why You’re Scared of Role Swaps

Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
On-Demand Webinar

5 Myths About Encryption on IBM i

In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar

What’s New with Robot?

Looking for an easy way to catch up with Fortra and hear how the new features in Robot may benefit you and your company? Here’s your chance!
On-Demand Webinar

Panel Discussion: Your IBM i Security Action Plan

When your to-do list is a mile long, security might not bubble to the top—unless and until something catastrophic happens. But dealing with a cybersecurity catastrophe is far more time-consuming (and expensive) than a proactive approach. Join the Fortra team of IBM i security experts for a discussion geared to help you take concrete steps toward improving your IBM i security posture. They’ll cover...
On-Demand Webinar

Your Role in the RDi Roadmap

In this session, you’ll see how RDi is strategically designed to help developers like you deliver impactful software to your organization faster and with higher quality.
On-Demand Webinar

Encryption on IBM i Simplified

DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.