Resources

Article

Take Your Work to Warp Drive!

If your mission is work management, IBM i is the best starship in the fleet. Routing certain types of work into subsystems and memory pools, separating dissimilar work, and giving jobs the appropriate CPU time—this is work management the Windows world can only dream about.
Article

Two-Way Message Response with Robot

You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Press Release

HelpSystems’ (now Fortra's) GoAnywhere Cloud Connectors for Salesforce, Dropbox, and More Are in High Demand for Secure Managed File Transfer

GoAnywhere MFT Cloud Connectors are popular among Fortra customers for their ability to connect with everyday business applications to automate secure file sharing. Not only is Fortra actively updating and improving previously released Cloud Connectors based on customer feedback, it also encourages users to create their own integrations.
Press Release

Weak Internal Security Causes Weak External Security

Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Article

The Six Ws of Granular Access Control

This article takes a closer look at why granular access control is so effective by placing limitations on who can get into your organization’s system, where, when and how they can access it, and what they can do with it.
Article

Eight Steps Toward a Secure Hybrid Cloud Environment

Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.