Resources | HelpSystems



Attended RPA and Forms

There’s more than one way to automate a process—but results may vary. That’s why it’s critical to understand the different types of process automation so you can determine how to build a workflow that will best meet your goals. Let’s start by discussing unattended vs attended RPA. In unattended automation scenarios, the bot executes without any human participation. An attended bot, on the other...

From Receptionist to Senior Scrum Master: Dana Halvorson

Dana Halvorson supported grieving families as a funeral director before becoming a HelpSystems receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.
Live Event
You’ve seen what Automate can do to streamline your most tedious processes. But are you ready to take your automation up a notch? Join Austin Stanley, Technical Consultant, to discover advanced best practices from our pros to effectively scale your automation, fine tune your Center of Excellence, and increase your ROI. Topics include: Task templates & custom logging Task functions, events, and...
Live Webinar

How to Modernize Your Query/400 Queries

Sequel software makes your transition to modern data access and analysis from Query/400 simple. Register for this webinar to see how.
Press Release

Credence Security Signs Distributor Agreement with HelpSystems

Credence Security, a leading regional distributor of specialized solutions in cybersecurity, forensics, governance, risk, and compliance, has signed a distribution agreement with HelpSystems, a cybersecurity and automation software provider, to deliver their expansive portfolio across the UAE and wider GCC region.
Live Event

IBM i Security Tour

Join Sandi Moore at Topgolf on October 18th for a day of education designed to provide insight and answers about cybersecurity on IBM i. About the IBM i Security Tour Cybersecurity is a critical business issue, but staying on top of this constantly changing field isn’t easy. Join IT leaders, technicians, and auditors from around the world for a day of valuable education all about improving your...
Live Event

Email Security Best Practices: How to Protect Against Advanced Threats

Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance. That...