On-Demand Webinar
IBM i Security Trends and Threats to Watch in 2022
By Sandi Moore
IBM i security expert Sandi Moore looks into the future to identify key trends that are likely to drive cybersecurity conversations in the next 12 months.
page
IBM i Software Solutions
Fortra aligns IT and business goals to help IBM i organizations build a competitive edge. Our software secures IT environments, monitors and automates processes, and provides easy access to the information people need. More than 15,000 organizations in 100+ countries rely on Fortra to make IT lives easier and keep business running smoothly. Organizations have relied on Fortra's expertise since the IBM i was AS/400.
Article
5 Things to Try During Your Sequel Data Access Trial
By Stacy Jensen on Mon, 12/13/2021
Ready to start your Sequel Data Access business intelligence (BI) software trial? Here are five things you need to try.
On-Demand Webinar
What Most IBM i Shops Get Wrong About the IFS
By Robin Tatam
Learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.
Article
5 Reasons IT Teams Purchase Sequel Data Access
Thu, 12/09/2021
IT teams are under a lot of pressure to keep up in today's business world. Sequel can help relieve the pressure. Learn how.
cta_page
Schedule a Free Software Health Check
What do you want to hear first? The good news or the bad? The good news: Fortra software keeps your IBM i running so efficiently, reliably, and securely that you never even have to think about it. The bad news: You haven’t thought about it for a long time. This a friendly reminder that your Fortra products may be overdue for a FREE Health Check. Take advantage of the experts at Fortra and schedule...
Datasheet
Why Upgrade from Showcase 9 to Showcase 10?
In addition to supporting and replicating the majority of the Showcase 9 feature set, the following features are available with Showcase 10 for IBM i business intelligence and data access.
On-Demand Webinar
Security Alert! Prevent FTP and ODBC Data Breaches on IBM i
By Amy Williams
Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes.
On-Demand Webinar
Ask the Sequel Experts: Part I
Watch this webinar to get insights from our experts on anything and everything Sequel and your business intelligence needs.
On-Demand Webinar
Ask the Sequel Experts: Part II
Watch this webinar to get insights from our experts on anything and everything Sequel and your business intelligence needs.
Article
5 Time-Saving Tips for Smart Data Access on IBM i
By Stacy Jensen on Wed, 11/17/2021
Is there too much on your IT department’s plate? Get five tips for saving time today with smart data access on IBM i.
On-Demand Webinar
2021 Business Intelligence Week
Watch this webinar series for your FREE opportunity to learn what every user should know about Sequel Data Access, plus advanced tips and tricks for improved IBM i (iSeries, AS/400) business intelligence.
On-Demand Webinar
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
Article
13 FAQs on Switching from Query/400 to Sequel
By Heath Kath on Wed, 10/20/2021
Find out why you should choose Sequel Data Access for your IBM i queries—and leave Query/400 behind.
On-Demand Webinar
I Have All Object Authority and I’m Not Afraid to Use It!
By Amy Williams
In this webinar, security expert Amy Williams explores best practices for All Object authority and strategies for correcting this vulnerability.
On-Demand Webinar
Protecting Mission-Critical Systems from Modern Malware Threats
By Bob Erdman
Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware can just as easily target your servers, both on-premise and in the cloud. As malware and ransomware attacks have grown, so have the number of compliance mandates—and yet many organizations are still getting breached. Join this webinar with Bob Erdman, cybersecurity expert and Associate Director of...
On-Demand Webinar
Survival of the Fittest: Defending IBM i Against a Cyber Attack
By Robin Tatam
Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses? The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details. In this webinar, IBM i...