Resources

Blog

How to Succeed at IBM i Security

Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Blog

What is Hyperautomation?

For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen. Enter hyperautomation . What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy....
Blog

You’ve Upgraded Your Hardware. Now It’s Time to Upgrade Your Security Posture

If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
Blog

How to Meet Cyber Insurance Requirements for IBM i

Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Blog

Workload Automation (WLA) vs. Robotic Process Automation (RPA)

Automation remains a popular technology for businesses of all kinds. Within the realm of automation, there are a lot of acronyms representing different tools and approaches—two of the most common are workload automation (WLA) and robotic process automation (RPA). As you plan your strategy, it’s important to understand the differences of workload automation vs. robotic process automation. Both have...
Blog

Automation vs Hyperautomation: Learn the Differences

Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation. Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog

Recommended QSECURITY Level for IBM i

The system security level (QSECURTY) sets the overall tone for your IBM i security posture. Read this blog post to learn how many organizations are following IBM's best practices.
Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study , which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here .