Resources

Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
On-Demand Webinar

Fortra Champions chat about IBM i

In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
On-Demand Webinar

How to Protect Your Data with Layered Security

Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Blog

Data Privacy vs. Data Security: What’s the Difference?

Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
On-Demand Webinar

Survival of the Fittest: Defending IBM i Against a Cyber Attack

Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses? The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details. In this webinar, IBM i...
On-Demand Webinar

Secure and Automate Your File Transfers for IBM i

Thank you for viewing for this on-demand webinar. If you have questions following the webinar, please contact us. You can also download the presentation slides here.About the WebinarUsing IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not riddled with meticulous details. From scripting knowledge to running commands, there’s a lot...
On-Demand Webinar

10 Ways to Make IBM i File Transfers Easier

Thank you for interest in this on-demand webinar. If you have questions following the webinar, please contact us. You can also download the presentation slides here....
Blog

Open PGP for IBM i (iSeries)

GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus. With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...