Blog
How to Apply IDS/IPS to IBM i
By How to Apply IDS/IPS to IBM i on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?
Blog
Banking on Value: Why Banks Are Turning to Data Warehouses for Insight
By Alan Jordan on Tue, 05/09/2017
Find out why so many banks are turning to data warehouses for trustworthy analytics and actionable insight.
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Need a Linux Network Monitoring Tool? Here's What to Look For
By Kevin Jackson on Fri, 04/28/2017
Is your organization running technology on the Linux operating system? From user-friendliness to flexible monitoring, make sure your Linux network monitoring tool has the features you need to ensure availability for your servers, hardware, and applications.
Blog
What’s the Difference Between Two-Factor Authentication and Multi-Factor Authentication?
By Robin Tatam on Tue, 04/25/2017
Is MFA more secure than 2FA? Are the terms interchangeable? If not, what’s the difference between the two? Keep reading to get the facts.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Build or Buy: Multi-Factor Authentication Software for IBM i on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Multi-Factor Authentication Enhances Data Security
By How Multi-Factor Authentication Enhances Data Security on Fri, 04/21/2017
Many data breaches are attributed to user negligence in the form of weak or reused passwords. Watch this short video to learn how multi-factor authentication can neutralize these vulnerabilities.
Blog
Zero-Day Alert: Four Vulnerabilities Discovered in Riverbed Technology Performance Monitoring Platform Discovered by Digital Defense, Inc.
Mon, 04/10/2017
Digital Defense is publishing multiple application vulnerabilities in the Riverbed SteelCentral portal application today following the client notification by Riverbed Technology. Digital Defense’s Vulnerability Research Team identified the security issues through vulnerability scanning, and brought the flaws to the attention of Riverbed Technology in January 2017 following discovery. Riverbed...
Blog
Network Monitoring Software for Windows: 6 Must-Have Features
By Kevin Jackson on Mon, 04/03/2017
Choose a Windows network monitoring tool that is easy to install, user-friendly, and flexible.
Blog
New Trends in Workload Automation
Fri, 03/31/2017
Because IT enables competitive advantage, workload automation has had to evolve from simple job scheduling on a few mainframes to broader processes that incorporate many platforms and applications.
Blog
Speedy Network Remediation with Intermapper and Automate
By Kevin Jackson on Thu, 03/30/2017
Learn how to cut your remediation time from hours to minutes thanks to a seamless interface between two Fortra products, Intermapper and Automate.
Blog
Debunking the Top 3 Workload Automation Myths
Thu, 03/30/2017
There are a lot of rumors out there about workload automation. Fortunately, thanks to 30+ years of job scheduling experience at Fortra, we can help you separate fact from fiction.
Blog
Automation: What tasks are better left to people?
Thu, 03/30/2017
At Fortra, we talk a lot about the advantages of workload automation. But are there tasks that shouldn't be automated?
Blog
How to Achieve Enterprise Visibility in Today's Virtual World
Thu, 03/30/2017
Job schedulers automate IT processes, which not only adds visibility for IT administrators, but ensures that all background activities—ones that do not necessarily need manual interaction—are carried out on schedule.
Blog
Turn Data into Information Your Business Needs
By Mike Stegeman on Thu, 03/30/2017
Data isn’t the same as information—but you can turn data into information. Learn how.
Blog
Perspectives on IT Outages: What Do They Mean For Your Business?
Thu, 03/30/2017
Reliable uptime is key for ensuring smooth business processing and quality customer relationships. What are the specific organizational and technical repercussions of downtime and extreme IT outages?
Blog
Top 5 Reasons Custom Scripts are Putting Your Business at Risk
By Steve Brasen on Thu, 03/30/2017
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Handling Workflow Errors with an Enterprise Job Scheduler
Thu, 03/30/2017
Your workflow can be disrupted by an error at any time. The right enterprise scheduler will diagnose and deal with the problem.
Blog
Achieving Workload Automation Goals
Thu, 03/30/2017
You've heard it before: workload automation will save you time, money, and resources. But what features does your automation software need to ensure you accomplish these goals?