Resources

Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

One of the latest data security breach examples is EasyJet, which revealed that nine million customers’ personal data was compromised. Learn more about data breaches in the age of COVID-19, and what steps you can take to protect your organization.
Article

All About Alert Intelligence

Thanks to intelligent filtering, the Alert Intelligence feature included in IBM i Server Suite improves the quality of IBM i alerts while reducing the quantity, providing increased application availability and system uptime.
On-Demand Webinar

Replacing FTP Scripts with Managed File Transfer

Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide. If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other insecure, manual methods is a...
Blog

Five Secure File Transfer Alternatives to FTP

FTP was a gold standard for file transfers in the 70s. But with today’s cybersecurity concerns, it’s no longer enough. Use these five secure file transfer methods to protect your data instead.
Datasheet

GoAnywhere Managed File Transfer

GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. With extensive security controls and detailed audit trails, GoAnywhere MFT will help your organization comply with data privacy regulations and PCI DSS. This innovative solution automates Server-to-Server file transfers and simplifies...
Datasheet

Halcyon for Managed Service Providers

Fortra Takes Your Managed Services to the Next Level In today’s economy, managed service providers try to get by with what they have, but that doesn’t mean that there isn’t something better out there. Whether you host your customers’ systems in your data center or provide remote monitoring or cloud-based services, Fortra has a technical solution and a commercial model to suit your business...
Datasheet

IBM i Server Suites

See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet

Trap Receiver

Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Datasheet

HA-MX Monitor

HA-MX Monitor ensures a maximum return on your investment for your MIMIX solution and helps eliminate lost income as a result of downtime.
Case Study

SQL SCHEDULING GOES ENTERPRISE

Company Background Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study

SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS

Company Background SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people. The company’s products are widely distributed through...