Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
Blog
A Day in the Life Working with Bots
Mon, 11/04/2019
Thanks to robotic process automation (RPA), many organizations are seeing the benefit of having a digital workforce alongside their human employees. Think of them as virtual assistants, taking care of your most tedious, repetitive tasks—plus, they’ll never drink the last of the coffee. There are many day-to-day processes that make perfect candidates for automation and robots . Here's a look at one...
Blog
Strengths and Capabilities Offered by Automation
Fri, 11/01/2019
Learn about the strengths and capabilities offered by automation, whether through RPA or BPA, and find out how you can take advantage of the transformative technology.
Blog
Tips for a Successful RPA Adoption
Wed, 10/30/2019
Start your robotic process automation (RPA) journey off on the right foot by learning the people, processes, and infrastructure needs for adopting and scaling automation.
Blog
Benefits of Business Process Automation: Five Problems BPA Can Solve
Wed, 10/30/2019
You’ve heard all about business process automation and how it can save enterprises time and money. But how do you know if your business has a need for BPA software? Here are five common problems you might be facing that can easily be solved with the right automation tool
Blog
Why Should You Delete Journal Receivers?
By Tom Huntington on Thu, 10/17/2019
Excessive disk space usage causes your IBM i (iSeries, AS/400) backups and disk reporting to take longer. It's best practice to automate clean-up for your journal receivers. Here's how.
Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Blog
Automating SharePoint Monitoring for Better Collaboration
Mon, 09/30/2019
Learn how you can use robotic process automation (RPA) to set up a Microsoft SharePoint monitoring task to monitor SharePoint folders and take actions to automatically move, change files, and send email notifications using Automate.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI? I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis. Visit this page to get access to the RPA Toolkit and download the RPA ROI...
Blog
Encrypting IBM i Sessions in Access Client Solutions (ACS)
Tue, 09/17/2019
Fortra security expert explains how & why you should encrypt IBM i sessions using SSL (TLS) in Access Client Solutions (ACS).
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
Blog
Five Secure File Transfer Alternatives to FTP
Mon, 09/16/2019
FTP was a gold standard for file transfers in the 70s. But with today’s cybersecurity concerns, it’s no longer enough. Use these five secure file transfer methods to protect your data instead.
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.