Resources

Datasheet

Offensive Security - Advanced Bundle

Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features. Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
Datasheet

Fortra Ransomware Defense

As part of the Fortra cybersecurity portfolio, Fortra Ransomware Defense enables companies to mitigate the risk of ransomware attacks with early detection and proven prevention capabilities.
Article

The Difference Between OCR and IDP

Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
Datasheet

LEVEL 4: Operations Center Suite

Does This Sound Familiar? How would you answer the following questions? Can you schedule highly complex job streams and track them across different IBM i systems or servers? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take...
Datasheet

LEVEL 3: Advanced Automation Suite

Does This Sound Familiar? How would you answer the following questions? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action? Can you automate disk space management, freeing technical resources for other...
Live Webinar
Join Kevin Jackson, Solutions Engineer, and Steve Vold, Senior Support Analyst, on September 17th —as they share tips, answers to frequently asked questions, and best practices for getting the most out of Intermapper.
Live Webinar
Whether it’s robotic process automation (RPA) or business process automation (BPA), Automate has you covered. Register now to see automation in action and get the chance to ask any questions you might have.
Article

Stand Guard Anti-Virus for Linux 4.1.3: Download and Installation

Use the following instructions to download and install Stand Guard Anti-Virus for Linux. Minimum System Requirements RHEL 5.x/6.x 32-bit RHEL 5.x/6.x/7.x 64-bit CentOS 5.x/6.x 32-bit CentOS 5.x/6.x/7.x 64-bit Oracle EL 5.x/6.x 32-bit Oracle EL 5.x/6.x/7.x 64-bit SLES 11/12 64-bit Ubuntu 14.04/16.04 64-bit RHEL 6.8/7.2 Power Linux Big Endian SLES 11 Power Linux Big Endian SLES 12...
Article

What is SNMP, and How Does It Work?

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
Datasheet

Level 2: Systems Operations Suite

What Is Level 2: Systems Operations Suite? Level 2 of the Halcyon IBM i Server Suites, Systems Operations Suite offers powerful and highly functional automation features for even tighter control of mission-critical business applications and processes. This solution provides total peace of mind that your IBM i is running at its full potential and maximizing system uptime for your business. Level...
Article

Content Intelligence: What Is It and Why Is It Important?

There are many different strategies a company can employ to help drive their organization to the next level. But why not use what you already have in your hands? Connect your content, documents, and information together to drive your business to the next level.
Datasheet

Level 1: Message Management Suite

Level 1 of the Halcyon IBM i Server Suites, Message Management Suite is an entry-level system monitoring and automation solution for the IBM i operating system. Unlike the basic system reply list that ships with IBM i servers, Level 1 addresses the fact that system-critical information messages often go unnoticed on a busy system.
Datasheet

Zero Trust File Transfer

A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
Article

How Automate Complements Other RPA Solutions

If you’re already seeing success with RPA and want to expand its capabilities and use, see how Automate RPA can add ease-of-use, scalability, and more to fill in any gaps your RPA solution may have.
Datasheet

Clearswift Secure ICAP Gateway

The Secure ICAP Gateway complements existing web proxy infrastructures and MFT software to provide an added layer of data security.