On-Demand Webinar
The Business Intelligence Boom
Business intelligence adoption is on the rise. And it’s time to modernize. Make 2020 the year you finally see your data clearly, quickly, and securely with Sequel webinar.
Compliance Monitor Comparison Checklist
TABLE OF CONTENTS:
• Installation and Planning
• Compliance Monitoring, Auditing, and Reporting
• Internal Application Security and Setup Options
• Automatic, Batch, and Manual Assessment Availability
Today's security requirements can overwhelm even the most organized IT department. Sarbanes-Oxley (SOX) and Payment Card Industry (PCI) auditors demand proof of compliance on critical systems.
...
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
AS/400 Security in an IBM i World
By Robin Tatam
Learn why outdated security implementations put IBM i organizations in danger and how you can minimize the risks.
On-Demand Webinar
How to Use BI for Better Invoicing on IBM i
When Meissner Mfg. needed a better way to streamline their accounts receivable, they turned to Sequel and have been thrilled with its impact. Join this webinar to hear our conversation with Meissner Mfg. on how they saved 100+ hours a month with better business intelligence on IBM i with Sequel.
Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
On-Demand Webinar
IBM i Data: A Picture Is Worth 1,000 Words
As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs).
Decision-makers need to visualize the data before...
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?
I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis.
Visit this page to get access to...
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
The Ongoing Truth About Viruses on Linux
By Bob Erdman
This webinar focuses on providing an action plan to ensure your Linux environment is properly bolstered against attacks.
On-Demand Webinar
How to Meet the Newest Encryption Requirements on IBM i
By Robin Tatam
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity. But how do you meet encryption mandates on IBM i?
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
On-Demand Webinar
How to Avoid a Billion-Dollar IBM i Security Disaster
By Robin Tatam
Watch this live webinar to decode common requirements and build a roadmap to compliance for IBM i.
Blog
Working with Software Robots: Top 5 Ways to Spark Collaboration with RPA Bots
Tue, 09/10/2019
Learn how with robotic process automation (RPA), your employees can work with collaborative robots to be more productive, accurate, and get more free time.
cta_page
Schedule an IBM i Risk Assessment
Identifying the security gaps on your system is the first step toward fixing them.
That’s why vulnerability assessments are a cybersecurity best practice and a requirement for mandates like PCI DSS, HIPAA, and GDPR.
A Risk Assessment from Fortra is a thorough appraisal of your organization’s IBM i security configuration, including a micro-level analysis of system-specific configuration options...
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
Article
Empower Your Security Monitor with Powertech SIEM Agent for IBM i
By Robin Tatam on Wed, 08/28/2019
Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.