Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Datasheet
Powertech Antivirus for IBM i
Native Protection for IBM i
Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus.
Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Blog
How SIEM Protects Cloud Servers
Tue, 10/16/2018
Security information and event management (SIEM) applications help IT professionals oversee their vast technology infrastructures, including cloud repositories. SIEM applications aggregate data from many different types of systems to present a clear view of the actionable security tasks your team must address to protect your business.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in the number of SIEM...
Blog
SAO vs. SIEM: Not Enemies, But a Security Defending Duo
Thu, 08/16/2018
As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
Blog
How to Automate Security Policy Enforcement
By Robin Tatam on Wed, 10/18/2017
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Datasheet
Event Manager
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Schedule a demo today.
On-Demand Webinar
Simple Strategies for In-Depth Malware Defense
By Sandi Moore
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Blog
Building a Better Virus Trap
By Sandi Moore on Fri, 03/10/2017
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog
A Virus on i?
By Sandi Moore on Thu, 03/09/2017
Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog
Three IFS Security Weaknesses You Must Secure Now
By Robin Tatam on Thu, 03/09/2017
The Integrated File System (IFS) is one of the most ignored parts of the system, yet it makes possible many of the most powerful and most used features on IBM i servers today.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...