Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Transferring files securely is just one of the many benefits of GoAnywhere MFT. Explore the many file transfer security and collaboration features and see a live demo of the software in action in this quick, informative webinar.
Learn what you need to know when you inherit admin duties on an IBM i (AS/400, iSeries) as the experts share proven strategies for successful IBM i systems management.
This live webinar can help you target the information you’ll most need to consider when evaluating different MFT solutions. Consider these 60 minutes your buyers guide to help you make an informed decision.
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
As cyber threats become more sophisticated, strong encryption is essential. DB2 Field Procedures (FieldProcs) can greatly simplify encryption on IBM i, yet most organisations are not yet utilising this powerful...
Join us for a discussion on how two companies successfully utilised RPA to streamline their critical processes.
In this live webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
The events of 2020 upended day-to-day life at most organizations. A rapid move to working from home expanded the cyberattack surface for many businesses. Even where remote work was impossible, IT teams faced...
If you’ve ever wondered which users, protocols, and applications are draining your bandwidth, now’s your chance to find out. We’ll introduce you to Intermapper, a powerful bandwidth monitoring tool that gives you a complete picture of your network activity.
Is your organization using legacy programs or unsecured processes to transfer files on the IBM i? It can be time consuming to write and maintain file transfer scripts, solve connection issues with trading partners, and ensure data is protected every step of the way. Join us to learn how to streamline, secure, and audit your file transfers.
In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
There’s no shortage of actions you could take, but what...
When it comes to robotic process automation, there are a wide-range of providers and alternatives. Learn more about how RPA providers Blue Prism and Automate RPA measure up in relation to ease of use and cost effectiveness, and see what users have to say when comparing these solutions head-to-head. Plus discover how Automate can be used alongside Blue Prism to maximize RPA capabilities.
In today’s remote working digital economy, having a robust data security strategy that centers on people, process, and technology is imperative.
Third party risk is certainly not new. But in our hyper-collaborative economy, it’s rapidly rising in significance.
Version 11 of Automate has just been released. Find out more about the new built-in actions, updated interface, and increased flexibility.
Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing...
Discover how lending institutions using Blend can take their processes to the next level using robotic process automation from Automate.
Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
The onset of the pandemic and subsequent boom in remote working forced many organizations to accelerate their digital transformation programs. But in the rush to migrate to the cloud and against a backdrop of evolving cyber threats, are organizations leaving themselves vulnerable to cyber-attacks?
HelpSystems announced today the opening of its Automate Bot Store, a marketplace for Automate users to create meaningful automation with pre-built bots. The store’s bots interpret and run tasks for organizations, allowing them to accelerate their automation projects easily.