Blog | Fortra

Blog

Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog

Job Status and Other Stories About Application Monitoring

As a system engineer, I’ve done hundreds of demos and helped many companies set up their IBM i monitoring. I’ve developed a pretty good idea of what people want to be most aware of on IBM i, and it’s this: Are my applications running OK? This makes sense because, ultimately, IBM i is a very well-made tool for running your applications. In turn, you want to keep your applications running because...
Blog

Job Scheduling Options from HelpSystems

You’ve known for years that you need a more sophisticated scheduling tool for automating the applications and administrative tasks running on the servers in your data center. Cron, Windows Task Scheduler, and the built-in, native IBM i job schedule entries don’t allow dependencies, have no reporting or notification options, and allow no flexibility around dynamically calculating parameter values...
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core...
Blog

Top Social Media Threats Targeting the Retail Industry

Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns. Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog

IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity

Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum for...
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.