What is the Fortra Value Proposition for Cybersecurity?
In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Keeping Cloud Security Top Priority in Your Digital Transformation
By Chris Spargen on Tue, 03/15/2022
Digital transformation is quickly becoming a must for many organizations, and cloud security is perhaps the most fundamental component in its success.
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Job Status and Other Stories About Application Monitoring
By Kurt Thomas on Mon, 03/14/2022
As a system engineer, I’ve done hundreds of demos and helped many companies set up their IBM i monitoring. I’ve developed a pretty good idea of what people want to be most aware of on IBM i, and it’s this: Are my applications running OK? This makes sense because, ultimately, IBM i is a very well-made tool for running your applications. In turn, you want to keep your applications running because...
Job Scheduling Options from HelpSystems
By Chuck Losinski on Mon, 03/14/2022
You’ve known for years that you need a more sophisticated scheduling tool for automating the applications and administrative tasks running on the servers in your data center. Cron, Windows Task Scheduler, and the built-in, native IBM i job schedule entries don’t allow dependencies, have no reporting or notification options, and allow no flexibility around dynamically calculating parameter values...
Solving Big Cybersecurity Challenges Needs Big Thinking. Fortra’ John Grancarich is Ready.
Tech visionary John Grancarich discusses today’s cybersecurity challenges and Fortra’ innovative plans for helping customers succeed.
Secure Data Sharing Solves These 3 Cybersecurity Challenges
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan
Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core...
Top Social Media Threats Targeting the Retail Industry
Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns. Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity
Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum for...
Data Security Best Practices Every CISO Should Know
By Scott Messick on Tue, 02/15/2022
Shouldering data security as a CISO is a hefty job. Adopting a few of the best practices to surround data can make it a lot easier.
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.