Article
4 Impactful Tasks to Automate with Desktop Automation Tools
Tue, 09/17/2019
Using desktop automation tools let you work one-on-one with software bots to help you solve problems and simplify daily tasks within your environment. Learn the top four tasks to automate with desktop automation.
Article
Empower Your Security Monitor with Powertech SIEM Agent for IBM i
By Robin Tatam on Wed, 08/28/2019
Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.
Article
Outlook Automation: How to Automate Emails in Outlook
By Pat Cameron on Fri, 08/23/2019
Media
Image
Text
One of the most common email automation tasks in Outlook is processing attachments from incoming email. More specifically, downloading and processing invoices is...
Press Release
HelpSystems (now Fortra) Named Major Contender in Everest Group 2019 RPA Products PEAK Matrix
Automate, the robotic process automation (RPA) solution from Fortra, debuted on analyst firm Everest Group's PEAK Matrix.
Article
HelpSystems (now Fortra) Makes Debut Appearance as Major Contender in Everest Group RPA Products PEAK Matrix™ for 2019
Fri, 08/23/2019
Media
Image
Text
...
Article
Getting Started with Website Automation
Wed, 07/24/2019
Set up a website automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and set up a web automation task today.
Article
How to Do CRM Automation
Mon, 07/15/2019
Use robotic process automation (RPA) to easily integrate your CRM system with your most critical business applications to streamline your business processes. Learn how with Automate.
Article
I Have All Object Authority And I’m Not Afraid To Use It!
By Sandi Moore on Thu, 06/27/2019
When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
Article
I’ve Got *ALLOBJ Authority And I’m Not Afraid To Use It—Part 2
By Robin Tatam on Thu, 06/27/2019
While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.
Article
Remember the IFS!
By Robin Tatam on Thu, 06/27/2019
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article
HelpSystems (now Fortra) Rebrands Automate BPA Server to Automate Plus
Wed, 05/01/2019
Fortra is excited to announce that Automate BPA Server, our powerful enterprise business process automation (BPA) software, is now Automate Plus. All the features you know and love in Automate BPA Server are still available but Automate Plus aims to provide a more robust set of automation tools.
...
Article
Automate Website Monitoring in Less Than 10 Minutes
Mon, 04/15/2019
How can a 6-step automation task provide peace of mind when it comes to website monitoring? At Fortra, our web team works to make sure that people will always be able to access our website to find solutions to their IT problems. But they don’t work 24/7. Even with the team spread across different time zones, if a critical error occurs when no one is around—or that no one knows...
Article
Automate Named One of Best RPA Solutions
Wed, 04/10/2019
Automate was named among the Best Robotic Process Automation Software in the G2 Grid® for Robotic Process Automation (RPA) from G2.
Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Article
Comparing Different Methods for Calculating Health and Risk
By Per Bauer on Fri, 02/08/2019
How do you calculate IT health and risk?
There are different methods you can use, depending on your needs.
The most common methods for determining IT infrastructure health are:
Threshold comparison
Enhanced threshold comparison
Event detection
Variation from normal
Allocation comparison
Queuing theory for health
On the other hand, the most common methods for calculating...
Article
A Roadmap for Consolidation
Mon, 02/04/2019
There are five key steps when planning a consolidation strategy. Considerations for each step are outlined below.
Press Release
Weak Internal Security Causes Weak External Security
Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Press Release
HelpSystems (now Fortra) Extends Security Monitoring to Amazon S3
Policy Minder has been expanded to empower security monitoring for data stored on Amazon S3, giving IT professionals peace of mind any misconfigurations or oversights will be detected and rectified.
Article
Managing Your IBM i Audit Data
By Robin Tatam on Wed, 08/01/2018
Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.