Resources | HelpSystems

Resources

Live Webinar
Sep
01

Configuring ACS to Use SSL (TLS)

Join this informative webinar to learn how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.
Live Webinar
Aug
16

Cutting Through IBM i Security Confusion

Join security expert Amy Williams in this webinar where she answers some of your toughest IBM i security questions—useful for both beginners and veterans.
Live Webinar
Aug
16
Join security expert Amy Williams in this webinar where she answers some of your toughest IBM i security questions—useful for both beginners and veterans.
Article

The Difference Between OCR and IDP

Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
Live Webinar
Please join us for an educational discussion about the topic that's on all of our minds—cybersecurity. About this Event Join IBM i security expert Robin Tatam for a discussion that will provide insight and answers about cybersecurity, today’s top corporate initiative. Security and compliance affect every facet of a business, making them two of today’s top corporate concerns. Robin is on a mission...
On-Demand Webinar

Unlock Enterprise Automation with Automate Plus

Looking to expand your automation across users and bots? With Automate Plus, you can extend your capabilities by integrating frontend and backend automated workflows across your business. Watch now to learn how enterprise automation gives you the ability to build end-to-end automation that’s scalable, secure, and resilient. In this session we’ll cover: An overview of the Automate Plus architecture...
Guide

Four Ways to RPA: An Exploration of the Different Types of Process Automation

The Evolution of RPA Robotic Process Automation (RPA) has taken the world by storm in recent years because of its ability to automate mundane tasks that humans are still performing manually. However, automation as a software solution has been around long before the term RPA was widely used. Progressing from script-based automation tools to business process automation to specialized tools for...
On-Demand Webinar

Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i

The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected. To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them. Watch our webinar...
Blog

IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity

Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.