Resources

On-Demand Webinar

Out With AFP, in With iForms

Watch now for an informative webinar where Document Management expert Greg Schmidt discusses iForms' value as a modern alternative to AFP and walks you through how to use iForms to create a variety of business critical documents.
Datasheet

iForms™

iForms enables you to create professional forms and reports from any data source.
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
On-Demand Webinar

How to Upgrade to IBM i 7.5

During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done!
On-Demand Webinar

Simple Ways to Tame Document Chaos

Modern organizations need critical documents to be readily accessible and secure. Watch this 30-minute webinar to learn how web-based document management systems can streamline document control and improve efficiency.
News Article

Your Money or Your Business: Beating the Business of Ransomware

Ransomware is big business. Attacks have evolved to become more complex, damaging and far reaching. In Teiss magazine, Mieng Lim, VP of Product Management, provides advice on how to protect against ransomware and prevent cybercriminals from penetrating an organization's defenses.
On-Demand Webinar

Intermapper Customer Workshop

In this informative session, Kevin Jackson, Solutions Engineer, and Steve Vold, Senior Support Analyst, share tips and best practices for getting the most out of Intermapper.
Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Article

What is SNMP, and How Does It Work?

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.