Resources

On-Demand Webinar

Fortra Champions chat about IBM i

In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
On-Demand Webinar

How to Protect Your Data with Layered Security

Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Datasheet

Zero Trust File Transfer

A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
On-Demand Webinar

Introduction to Fortra Automation

Optimizing and orchestrating IT automation across a complex, diverse infrastructure requires the right vision—and the right partner—to centralize your workflows and support critical business processes. As organizations embrace digital transformation, they’re finding a new set of challenges holding them back from true change—from juggling multiple unmanageable tools to finding it too expensive to...
Datasheet

SFT Threat Protection

Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Datasheet

Customer Phishing Protection Bundle

Prevent, Detect & Disrupt Phishing with an Integrated Solution from Agari & PhishLabsThreat actors impersonate legitimate brands to steal account holder credentials, leading to increased fraud and loss of customer trust. As phishing continues to rise, many organizations find themselves in need of more proactive protection that can deliver the email authentication, threat intelligence, and...
Datasheet

Fortra’s Training and Response Bundle Datasheet

Enterprises Are Susceptible to Devastating Email Attacks Frontline security stacks fail to stop some advanced email threats—exposing enterprises to attacks. However, excellent Security Awareness Training drives users to identify and report inbox threats, serving as a vital secondary line of defense. Trained users are an important part of a...
On-Demand Webinar

IBM i Gets No Respect

Watch this webinar to learn what you should do to safeguard IBM i when adding additional partitions (VMs), standardizing technologies, migrating or consolidating servers, and more!
On-Demand Webinar

How to Move to Power10 the Right Way

If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
On-Demand Webinar

Power10 Power Hour

In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
On-Demand Webinar

Workshop: PowerHA + Robot HA

Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.