-
Alan Jordan |
Greg J. Schmidt
On-Demand Webinar
Why Don't Companies Role Swap?
Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Datasheet
When to Use Robot HA, PowerHA, or Both
Discover the relationship between Fortra and IBM regarding Robot HA and PowerHA as well as when it is advantageous to use each one or both.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Product Video
How to Simplify IFS Journaling with Robot HA
Tue, 02/06/2024
Watch this demonstration of how you can simplify your IFS journaling using Robot HA.
Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this...
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
On-Demand Webinar
Discover Easy and Affordable High Availability
Watch as our IBM i experts showcase how easy it is to navigate Robot HA, the simplicity it brings to creating new rules, and why it's so affordable.
On-Demand Webinar
How to Move from Legacy HA to Robot HA in 30 Days
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i
By Rohit Mathur
The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them...
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
On-Demand Webinar
What Most IBM i Shops Get Wrong About the IFS
By Robin Tatam
Learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
On-Demand Webinar
Workshop: PowerHA + Robot HA
Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
On-Demand Webinar
Malware on Power Systems Servers: Breaking Down the Myths
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.