Blog
Need a Linux Network Monitoring Tool? Here's What to Look For
By Kevin Jackson on Fri, 04/28/2017
Is your organization running technology on the Linux operating system? From user-friendliness to flexible monitoring, make sure your Linux network monitoring tool has the features you need to ensure availability for your servers, hardware, and applications.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
On-Demand Webinar
What You Need to Know About IPv6 in 2017
What will push the industry past the tipping point? Should you be preparing your transition now? Get up to speed with all things IPv6 in this video.
On-Demand Webinar
Stay Connected to Your Network with Remote Monitoring
Remote network access could simplify your life and help you improve uptime. Find out why and how in this on-demand webinar.
Article
Generate and Distribute Audit Reports Automatically
By Robin Tatam on Mon, 04/03/2017
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.
Blog
Network Monitoring Software for Windows: 6 Must-Have Features
By Kevin Jackson on Mon, 04/03/2017
Choose a Windows network monitoring tool that is easy to install, user-friendly, and flexible.
Blog
Speedy Network Remediation with Intermapper and Automate
By Kevin Jackson on Thu, 03/30/2017
Learn how to cut your remediation time from hours to minutes thanks to a seamless interface between two Fortra products, Intermapper and Automate.
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Blog
The Top 11 Network Automation Examples
By Kevin Jackson on Mon, 03/27/2017
As your network grows in size and complexity, automation can free up network administrators from repetitive, manual tasks to focus on more strategic, fulfilling projects.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Thu, 03/23/2017
Now more than ever, securing your infrastructure is critical to the success of your organization.
Article
Advantages of Powertech Encryption for IBM i Over the Complexities and Risks of Disk Encryption
By Bob Luebbe on Fri, 03/17/2017
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
On-Demand Webinar
10 Things You Didn’t Know You Could Monitor with Intermapper
Did you know Intermapper can monitor any device with an IP address? Learn why flexible monitoring is a must in today's dynamic IT environments.
On-Demand Webinar
Seeing is Believing in the World of Network Mapping
In this half-hour on-demand webinar, learn how better network visibility can lead you straight to the problem device and allow you to take action before the issue spreads.
Blog
PCI Compliance is Only the Beginning of Security
By Robin Tatam on Wed, 03/08/2017
The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
Blog
PCI Compliance Takeaways from the Target Data Breach
By Robin Tatam on Wed, 03/08/2017
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog
What to Know about the New NIST Cybersecurity Framework
By Robin Tatam on Wed, 03/08/2017
Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Article
What Can Intermapper Monitor?
By Kevin Jackson on Wed, 03/08/2017
What can Intermapper monitor? Just about anything. Learn how to monitor any device with an IP address, making your network visibility as comprehensive as possible.
Blog
3 Key Skills of a Successful Security Administrator
By Robin Tatam on Tue, 03/07/2017
The constantly changing cybercrime landscape paired with the speed of new technologies can make it difficult to know which skills a security administrator should focus on.