Article
How to End MIMIX Headaches for Good
By Chuck Losinski on Wed, 05/13/2020
Ready to eliminate manual monitoring in Assure MIMIX? This article shows you how to start monitoring MIMIX and stop wasting your time and risking your irreplaceable data.
Blog
30 Ways to Simplify Life with Advanced Workflows
By Brian Pick on Thu, 02/27/2020
Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out.
Article
Making the Case for PowerVM
By Tom Huntington on Mon, 02/24/2020
Need to make a case to introduce PowerVM into your Power Systems environment? Read this article!
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Article
All About Alert Intelligence
By Andrew Bullivant on Thu, 02/13/2020
Thanks to intelligent filtering, the Alert Intelligence feature included in IBM i Server Suite improves the quality of IBM i alerts while reducing the quantity, providing increased application availability and system uptime.
Article
Availability Reporting for Managed Service Providers
By Paul Ratchford on Wed, 02/12/2020
Proving that you are meeting service-level agreements shouldn’t be a wasted effort. In fact, it should strengthen your relationship with clients and help your team manage performance in the future. See how.
Article
Log File Monitoring in IBM i Server Suite
By Paul Ratchford on Mon, 01/27/2020
Log File Monitor can monitor the contents of files in the integrated file system (IFS) and raise alerts based on this content. Read on to learn more.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
Replacing FTP Scripts with Managed File Transfer
Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide.If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other...
Blog
Five Secure File Transfer Alternatives to FTP
Mon, 09/16/2019
FTP was a gold standard for file transfers in the 70s. But with today’s cybersecurity concerns, it’s no longer enough. Use these five secure file transfer methods to protect your data instead.
Datasheet
GoAnywhere Managed File Transfer
GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. With extensive security controls and detailed audit trails, GoAnywhere MFT will help your organization comply with data privacy regulations and PCI DSS. This innovative solution automates Server-to-Server file transfers and simplifies...
Datasheet
Halcyon for Managed Service Providers
Fortra Takes Your Managed Services to the Next LevelIn today’s economy, managed service providers try to get by with what they have, but that doesn’t mean that there isn’t something better out there. Whether you host your customers’ systems in your data center or provide remote monitoring or cloud-based services, Fortra has a technical solution and a commercial model to suit your business...
Datasheet
IBM i Server Suites
See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet
Trap Receiver
Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Datasheet
Task Supervisor
Task Supervisor can simplify your task management and allow you to take control of your IT task list.
Datasheet
HA-MX Monitor
HA-MX Monitor ensures a maximum return on your investment for your MIMIX solution and helps eliminate lost income as a result of downtime.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
On-Demand Webinar
Secure and Automate Your File Transfers for IBM i
By Heath Kath
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.