On-Demand Webinar
The Safe and Secure Replacement for RUNRMTCMD
IBM stopped supporting the critical RUNRMTCMD due to security concerns. Watch this recorded session where our experts reveal how Robot Schedule Enterprise replaces RUNRMTCMD safely and securely.
On-Demand Webinar
Ten Job Scheduling Features Your IBM i Can’t Live Without
Watch this recorded session to learn which Robot Schedule job scheduling features are considered the most crucial to your IBM i's success and why.
Case Study
SFT Threat Protection Helps Credit Card Company Securely Transfer Files
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.
Blog
Automation vs Hyperautomation: Learn the Differences
Thu, 11/10/2022
Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation.
Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Infrastructure Protection & Data Security Solutions
Protect business-critical data with automated security solutions that help you stay ahead of today's ever-changing threats.
Blog
Security Solutions for Managed File Transfer
Tue, 08/30/2022
The next in our guest blog series from Tag Cyber looks the advantages of MFT and what organizations must consider when selecting a software provider.
Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
News Article
Taking Steps to Proactively Address Supply Chain Security Risks
In The Logistics Point, Chris Spargen looks at how secure managed file transfer can help organizations combat data loss security risks in the supply chain.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
On-Demand Webinar
IBM i Automation Series: Job Scheduling
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
Press Release
GoAnywhere Recognized as a 2022 Top Performer in Managed File Transfer by SourceForge
MFT solution earns user rating of 4.5/5 across all categories, including ease of use, features, design, and support.
On-Demand Webinar
Streamlining the Exchange of Secure Data
Discover tactics for simplified data management in a world of huge data volumes
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.