Blog

Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

User Interfaces: GUI vs. WUI

You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog

What’s New in IBM i 7.2?

May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Blog

Is Your Team A Little Rusty on IBM i Operations?

Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Blog

Learning Cyber Defense Strategies from Stratego Strategy

I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog

3 Ways Digital Document Management Helps Financial Institutions

Secure document management is an important consideration for any business, but for financial instutions in particular, keeping data secure is critical to keeping business running smoothly and clients happy. Learn how digital document management gives financial instutions the competitive edge they need to succeed.
Blog

Vulnerability Research Team Shares Details Regarding Recent Zero-Day Discoveries

Today Fortra is publishing several high-impact vulnerabilities on the Dell SonicWall GMS platform that our vulnerability research team discovered and brought to the attention of Dell. Dell has been extremely professional and worked diligently with Fortra engineering staff to understand, resolve and verify the fixes for these security issues. Dell has released fixes and customer advisories for...
Blog

Moving Documents Between IFS Folders

Because Webdocs maintains a separation between its internal file structure and the operating system’s, you can organize documents for your users in one manner, while organizing them on the IFS in an entirely different manner. This article takes you through the steps of reorganizing the folder structure on the IFS.
Blog

What Is Queuing Theory?

Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Vulnerability Research

Finding the Solarwinds Flaw

Several months back I was updating our vulnerability scanner checks for various Solarwinds products. As I added a detection script for a product called Log and Event Manager (LEM), I realized that there were really no significant publicly disclosed vulnerabilities for it. This spurred me to download their trial, which comes as a virtual appliance, and look for some flaws. After initially setting...
Vulnerability Research

DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command Execution

Title: DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command ExecutionSeverity: HighDate Discovered: August 15, 2015Discovered By: Chris Graham @cgrahamsevenVulnerability Description:SolarWinds Log and Event Manager (LEM) is vulnerable to an Extensible Markup Language (XML) external entity injection through the agent message processing service. This service listens on TCP port 37891....
Blog

The Long Goodbye to SSL/Early TLS

If your organization is required to comply with the Payment Card Industry-Data Security Standard (PCI-DSS), particularly Requirement 11, then you are likely familiar with the problems plaguing SSL, early TLS (i.e. TLSv1.0) and their supported ciphers over the past several months. High profile vulnerabilities such as HeartBleed, POODLE, FREAK and LogJam have sent merchants scrambling to patch...