Blog
How Can You Use Easy Web RPA?
Tue, 06/25/2019
The internet has made our lives easier in so many ways, especially in the workplace. Most information you need can be found at the end of a few clicks. But when your daily tasks require information found online, even the simplest website actions—like clicking buttons, downloading files, and navigating windows—can add up to a big chunk of time when you’re repeating website actions over and over...
Blog
How to Answer Key Capacity Planning Strategy Questions
Fri, 06/21/2019
Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year.
If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked.
Do you have enough resources on hand for the...
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
Blog
The True Cost of Workload-Related Outages
Thu, 06/06/2019
Underestimating the consequences of downtime can be hugely detrimental to your productivity. Accurately calculating those costs won’t just prevent disasters, but also help you effectively manage your capacity planning efforts.
Blog
What is Capacity Planning?
By Scott Adams on Wed, 06/05/2019
What is Capacity Planning?
IT capacity planning is a process used to manage IT service delivery. Business services depend on IT resources in most organizations. Retail organizations need IT to make sure their POS system stays up and running – even on days with unusually high transaction counts, like Black Friday. Banks and other financial services providers...
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Blog
Linux Security: Be Afraid. Be Very Afraid.
By Bob Erdman on Thu, 04/18/2019
Cybersecurity expert, Bob Erdman, sits down with Linux Journal to discuss security threats Linux users face on a daily basis.
Blog
Key Functionality of a Great Cybersecurity Software Solution
Mon, 04/08/2019
Evaluating and implementing cybersecurity software requires diligence. And if your InfoSec team is short staffed, choosing the right tools is more important than ever.
Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog
The Pros and Cons of Scripting
Thu, 03/21/2019
There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
12 Skills Every Security Administrator Needs for Success (and How to Learn Them)
By Robin Tatam on Sat, 03/09/2019
Mastering these 12 skills can make a security administrator a powerful weapon against data breaches.
Blog
HR Automation Tips Part 3: What Happens When You Automate HR Processes
Sat, 03/09/2019
Automating your HR processes can transform the way your human resources department operates. Find out what will happen when you automate HR.
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.