Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your...
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Blog
6 Pro Tips from the 2024 State of IBM i Security Study
Mon, 05/06/2024
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2024 State of IBM i Security Study!
Blog
The Value of a Tech Update
By Tom Huntington on Sun, 05/05/2024
When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
Blog
Free Backup Management Software vs. Paid – Which Is Right for Me?
By Debbie Saugen on Mon, 03/04/2024
When is the right time to rely on an Option 21 save and when should I turn to an enterprise-class solution like BRMS or Robot Save? Read on to find out.
Blog
The 10 Principles of Automation
By Tom Huntington on Thu, 02/22/2024
Our experts developed the following best practices for easing automation implementation and advancing automated operations over the course of 30 years of working to help businesses make their processes more efficient. Let the countdown begin!
Blog
How to Assess Data Center Operations
By Tom Huntington on Wed, 02/21/2024
Is your IBM i team managing the system manually? Want an easy way to assess data center operations? The experts at Fortra can help you get automated.
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
Is the AS/400 Dead?
By Tom Huntington on Mon, 02/19/2024
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Blog
IBM i: History and Timeline
By Tom Huntington on Mon, 02/19/2024
Did you know that IBM i’s origins pre-date the AS/400 server? Read on for IBM i operating system history and the IBM server history that has supported this powerful platform for decades.
Blog
The Changing Role of Government in Cybersecurity
By Antonio Sanchez on Wed, 11/29/2023
Governments are responsible for carrying out their duties to defend the rights and safety of their citizens. Find out their role in the cyber landscape and how Fortra plays a part.
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
Guide
10 Common Security Misconfigurations and How to Fix Them
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible?
Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application...
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Blog
Financial Services Cybersecurity: What You Need to Know
By Antonio Sanchez on Wed, 10/11/2023
Today’s financial threat landscape is evolving, and firms are facing record high risk. Learn what’s causing the uptick and which essential cybersecurity practices will ke.ep you safe