On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
How FRS Integrated Webdocs to Transform Their Business
Check out this important discussion on how integrating Webdocs within your current processes can truly transform your business.
On-Demand Webinar
How to Take a Planned Approach to Document and Forms Management for AP
Watch our on-demand webinar to learn the smartest way to implement document and forms management solutions for Accounts Payable (AP).
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How to Meet the Newest Encryption Requirements on IBM i
By Robin Tatam
For many organizations around the world, encryption isn’t just nice to have—it’s a necessity. But how do you meet encryption mandates on IBM i?
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
Datasheet
Halcyon for Managed Service Providers
Fortra Takes Your Managed Services to the Next Level
In today’s economy, managed service providers try to get by with what they have, but that doesn’t mean that there isn’t something better out there. Whether you host your customers’ systems in your data center or provide remote monitoring or cloud-based services, Fortra has a technical solution and a commercial model to suit your business.
...
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Blog
Choosing a Document Management Solution: 3 Questions to Ask
By Greg J. Schmidt on Tue, 07/09/2019
Make choosing a document management solution easier with these 3 questions you should ask when determining the best electronic document management system (EDMS) for your business.
Datasheet
IBM i Server Suites
See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet
Trap Receiver
Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Datasheet
Task Supervisor
Task Supervisor can simplify your task management and allow you to take control of your IT task list.
Datasheet
HA-MX Monitor
HA-MX Monitor ensures a maximum return on your investment for your MIMIX solution and helps eliminate lost income as a result of downtime.
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Blog
What is Forms Management Software?
By Greg J. Schmidt on Tue, 04/16/2019
Find out how forms management differs from document management. You’ll get real-life examples of forms management in practice, plus tips for getting started.
Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.