Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
News Article
Taking Steps to Proactively Address Supply Chain Security Risks
In The Logistics Point, Chris Spargen looks at how secure managed file transfer can help organizations combat data loss security risks in the supply chain.
Blog
Penetration Testing Frequency: How Often Should You Test?
Fri, 06/24/2022
Penetration testing has become an increasingly standard exercise, with organizations using either pen testing services or in-house teams to uncover weaknesses and assess their security posture. Many businesses want to stay proactive about securing their IT environment and find that pen testing helps them stay compliant and prove adherence to regulations or industry best practices. According to the...
On-Demand Webinar
IBM i Automation Series: Job Scheduling
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar
Affordable and Easy-to-Use High Availability with Robot HA
Watch this webinar to learn from our IBM i experts as they demonstrate how easy it is to navigate Robot HA and the simplicity of creating new rules.
Blog
Solutions for Vulnerability Management
Fri, 04/22/2022
This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
Datasheet
Fortra's Security & Automation Portfolios
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that reduces the costly...
On-Demand Webinar
Performance Navigator Training: Automated Performance Reporting
Watch this webinar and learn how to automate daily, weekly, and monthly performance reporting using the Performance Navigator software from Fortra.
On-Demand Webinar
Fortra Champions chat about IBM i
In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
On-Demand Webinar
Inside the Integrated File System (IFS)
Watch this recorded webinar for an in-depth exploration of the integrated file system (IFS) on IBM i.
Press Release
Intermapper Earns Place on G2’s 2022 Best Software Awards for IT Management Products
Fortra today announced that its network monitoring tool, Intermapper, has been placed on G2’s 2022 Best Software Awards in the category for IT Management Products.
Guide
Taking Back Control
In Taking Back Control: A Proactive Approach to Advance Your Security Maturity, learn why adhering to the motto “Prevent First, Detect Always,” is the best way to set and achieve the goals of security operations. Incorporating proactive efforts into your security strategy can serve as the first line of defense by providing significant obstacles that discourage attackers by making breaking in overly labor intensive.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
On-Demand Webinar
The Power of 24/7 Network Monitoring for Government Entities
Watch now to learn how you can ensure network health of your government entity with comprehensive network monitoring.