On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
On-Demand Webinar
5 IBM i Job Scheduling Pain Points (and How to Solve Them)
Robot Schedule automatically and reliably runs millions of iSeries jobs for organizations all over the world every day. Watch this webinar to learn how.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Why Corporate Networks are Key Targets for Cryptojacking
By Bob Erdman on Thu, 12/06/2018
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
On-Demand Webinar
An Introduction To Cybersecurity
By Robin Tatam
In this session, security expert Robin Tatam covers cybersecurity basics, including compliance issues, preventing breaches, and the future of data protection.
On-Demand Webinar
Survey Results: Cybersecurity Risk Mitigation Strategies
By Robin Tatam
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Guide
Download "Why Managed Services Is Becoming IT Security’s Top Trend"
It’s time to reconsider traditional approaches to cybersecurity.
Handling IT security in-house is the norm at most organizations.
But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever.
With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to...
Article
How to Automate Report Balancing Across Windows and IBM i Servers
By Chuck Losinski on Fri, 06/02/2017
Watch this short video to see how easy report balancing can be when using our integrated solution of Robot Schedule Enterprise and Automate.
Article
Secret Capabilities of Robot Schedule Revealed
By Chuck Losinski on Tue, 01/31/2017
We recently surveyed our Robot Schedule technical support group for “ah ha!” moments that they’ve helped customers realize over the past few years. These tips from our tech gurus have helped customers automate jobs that needed to check a data area before running, track non-Robot jobs for reporting purposes, and check the status of a file before running a job.
Article
Customer Spotlight: Heartland Financial USA, Inc.
By Chuck Losinski on Tue, 01/17/2017
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
On-Demand Webinar
Enterprise Job Scheduling Makes Your Job More Manageable
Automated job schedulers should make all the jobs in your environment more manageable, including your own.
On-Demand Webinar
IBM i Meets Mobile Technology
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
On-Demand Webinar
Next Generation Job Scheduling
Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
On-Demand Webinar
Business Process Automation with Robot
Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
On-Demand Webinar
Execute Sequel Scripts and Reports Automatically—with Robot Schedule
Learn how to turn your Sequel scripts and reports into an automated job stream.
Article
Does Your Robot Schedule Have Old Jobs That Never Run?
By Tom Huntington on Tue, 08/30/2016
When it comes to cleaning up these old Robot Schedule jobs, the best way is to use a SQL statement that you can run from STRSQL. This article will show you how.
Blog
Do You Need Enterprise Scheduling Software?
By Tom Huntington on Tue, 08/30/2016
Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Article
Can File Events Automatically Populate Reserved Command Variables?
By Chuck Losinski on Tue, 08/30/2016
A powerful feature of Robot Schedule file monitoring is the ability to capture the file name and path information, and use it in a file transfer, copy or delete operation, or combination of commands.