Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Transferring files securely is just one of the many benefits of GoAnywhere MFT. Explore the many file transfer security and collaboration features and see a live demo of the software in action in this quick, informative webinar.
Learn what you need to know when you inherit admin duties on an IBM i (AS/400, iSeries) as the experts share proven strategies for successful IBM i systems management.
This live webinar can help you target the information you’ll most need to consider when evaluating different MFT solutions. Consider these 60 minutes your buyers guide to help you make an informed decision.
As cyber threats become more sophisticated, strong encryption is essential. DB2 Field Procedures (FieldProcs) can greatly simplify encryption on IBM i, yet most organisations are not yet utilising this powerful...
Join us for a discussion on how two companies successfully utilised RPA to streamline their critical processes.
The events of 2020 upended day-to-day life at most organizations. A rapid move to working from home expanded the cyberattack surface for many businesses. Even where remote work was impossible, IT teams faced...
Is your organization using legacy programs or unsecured processes to transfer files on the IBM i? It can be time consuming to write and maintain file transfer scripts, solve connection issues with trading partners, and ensure data is protected every step of the way. Join us to learn how to streamline, secure, and audit your file transfers.
In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
There’s no shortage of actions you could take, but what...
When it comes to robotic process automation, there are a wide-range of providers and alternatives. Learn more about how RPA providers Blue Prism and Automate RPA measure up in relation to ease of use and cost effectiveness, and see what users have to say when comparing these solutions head-to-head. Plus discover how Automate can be used alongside Blue Prism to maximize RPA capabilities.
Version 11 of Automate has just been released. Find out more about the new built-in actions, updated interface, and increased flexibility.
Discover how lending institutions using Blend can take their processes to the next level using robotic process automation from Automate.
Since the EU GDPR came into force in 2018 many countries around the world have followed suit and have either revamped or introduced new data protection and privacy regulation. India, too, is taking steps to enact a...
Learn how Automate stacks up as a Power Automate alternative and discover three key differences between these automation solutions in relation to practicality, scalability, and cost.
GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed...
Last month India's national airline, Air India, announced a cyber-attack on its data processor’s data servers that has affected about 4.5 million customers around the world . The breach involved...
To help you stay connected to the thriving IBM i community, we’ve compiled a comprehensive list of IBM i user groups around the world. Read on!
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Data security, corporate culture and more are discussed by HelpSystems’ Steph Charbonneau on popular blog, ModernCTO.
Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.