Resources

Guide

10 Common Security Misconfigurations and How to Fix Them

Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible? Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application Security...
Blog

Guardians of the Digital Realm: How Managed Security Services Keep Your Business Safe

In the world of cybersecurity, it's not just about keeping the bad guys out — it’s about staying one step ahead of their next move. The managed security services team at Fortra is dedicated to working with you to understand your organization’s unique security challenges and provide solutions to keep you protected against even the most sophisticated global threats. Get ready to exceed your...
Article

The Importance of VIOS

VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Guide

PCI DSS 4.0 Compliance: Tips to Avoid Last-Minute Panic

The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy. This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated requirements. Having a...
Guide

Fortra's Complete Guide to Layered Offensive Security

Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
Datasheet

LEVEL 4: Operations Center Suit

Does This Sound Familiar? How would you answer the following questions? Can you schedule highly complex job streams and track them across different IBM i systems or servers? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt...
Datasheet

LEVEL 3: Advanced Automation Suite

Does This Sound Familiar? How would you answer the following questions? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action? Can you automate disk space management, freeing technical resources for other projects...
Datasheet

Level 2: Systems Operations Suite

What Is Level 2: Systems Operations Suite? Level 2 of the Halcyon IBM i Server Suites, Systems Operations Suite offers powerful and highly functional automation features for even tighter control of mission-critical business applications and processes. This solution provides total peace of mind that your IBM i is running at its full potential and maximizing system uptime for your business. Level 2...
Datasheet

Level 1: Message Management Suite

Level 1 of the Halcyon IBM i Server Suites, Message Management Suite is an entry-level system monitoring and automation solution for the IBM i operating system. Unlike the basic system reply list that ships with IBM i servers, Level 1 addresses the fact that system-critical information messages often go unnoticed on a busy system.
Guide

A Single Pane of Glass for Multi-Platform Systems Management

Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog

Are MSPs Right for Me?

Figure out if MSPs are right for your organization. What are the risks and rewards of managed service providers?
Article

VIOS Performance Monitoring Commands

You might think VIOS is set and forget, but it’s not. Luckily, VIOS includes a number of command line utilities to help you obtain performance-related information from your VIOS partitions.