Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a...
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
Article
Audit Tested & Audit Approved Instant Authority!
By Robin Tatam on Fri, 03/24/2017
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Press Release
HelpSystems (now Fortra) Acquires Tango/04 Computing Group to Meet Growing Global Demand
Fortra and Tango/04 combine to help organizations in Europe and Latin America with systems management, monitoring, and security solutions.
Press Release
HelpSystems (now Fortra) Acquires Multi-Platform Systems Management Provider Halcyon Software
The recently acquired Halcyon Software solutions reduce the complexity and cost of monitoring, automating, and reporting on core applications and processes on IBM i, AIX, Linux, and Windows servers.