On-Demand Webinar
AS/400 Report Deployment for Remote Users
Watch this webinar for a unique opportunity to see how to deliver data to business users in way they have never seen before.
On-Demand Webinar
External vs. Internal Storage: Which Is Right for Me?
Watch this webinar where our panel of technology experts discuss the reasons why many organizations are taking advantage of SAN technology for virtualization, high availability, backup management, and more.
Self-Service Capabilities
Effectively managing user accounts within your Linux or UNIX server environment is imperative for mitigating risk in your organization and ensuring sensitive data and assets are protected. Core Privileged Access Manager (BoKS) provides centralized management of user accounts with automated self-service capabilities for access requests and password management....
Article
Three Advanced Scripting Tips That Help Solve Reporting Challenges
By Heath Kath on Fri, 05/08/2020
See how Sequel scripts make it easy to link together multi-step processes rather than manually running a series of steps to accomplish a complex task.
Datasheet
Anydate
See how easy it is to run your IBM i jobs in the past, present, and future with Anydate.
Blog
Solid State Drives with IBM Power Servers
By Tom Huntington on Tue, 04/28/2020
Using solid-state drives (SSDs) in IBM Power servers can provide numerous advantages over traditional HDDs, namely in the area of computing performance. See some of those benefits here.
Datasheet
Esend
Fast email and FTP distribution solution for IBM i data. Schedule a demo of Esend today.
On-Demand Webinar
Ask the Data Warehouse Experts
By Alan Jordan
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
Four Network Security Challenges for Organizations with a Remote Workforce
By Bob Erdman on Wed, 03/25/2020
Press Release
HelpSystems (now Fortra) buys 'ethical hacking' company, beefing up its cybersecurity business
HelpSystems has bought Strategic Cyber LLC, an "ethical hacker" that does business as Cobalt Strike, in the Eden Prairie company's latest move to beef up its cybersecurity presence.
On-Demand Webinar
20 Hidden Gems of Db2 for i
This webinar shares some of the best-kept secrets in Db2 for i and will help make sure you're using it to its full potential.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.