Resources

On-Demand Webinar

Streamline the Day-to-Day with IT Automation

In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and PowerLinux...
On-Demand Webinar

Panel Discussion: Your IBM i Security Action Plan

When your to-do list is a mile long, security might not bubble to the top—unless and until something catastrophic happens. But dealing with a cybersecurity catastrophe is far more time-consuming (and expensive) than a proactive approach. Join the Fortra team of IBM i security experts for a discussion geared to help you take concrete steps toward improving your IBM i security posture. They’ll cover...
Blog

19 Ways to Transfer Big Files

Transferring big files doesn’t have to create big hassles when you look for software solutions, like MFT, that can handle large files with ease and security.
Blog

What is File Encryption Software?

File encryption software is a tool that encodes data for better security. Encryption is essential to both cybersecurity and compliance. Learn how file encryption software is used to safeguard data worldwide.
Datasheet

Single Sign On (SSO) Managed Services

Managing user passwords involves unnecessary cost, aggravation, and lost productivity for most organizations. Yet many IT departments have given up hope of achieving single sign on due its complexity and perceived cost. SSO doesn’t have to be expensive or time-consuming, especially if your network includes a Windows domain along with applications running on IBM i (AS/400). Single Sign On Managed...
Article

Intermapper Is a Government and Defense Approved Network Monitoring Solution

Intermapper network monitoring software from Fortra is both a GSA-approved solution and recipient of a Certificate of Networthiness (CON), meeting all the technology standards required by the U.S. Army and U.S. Department of Defense (DoD). As part of the GSA Schedule, Intermapper can supply products to federal, state, and local government agencies at contract rates below market value.
On-Demand Webinar

Encryption on IBM i Simplified

DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Blog

What is Electronic File Transfer?

Electronic file transfer solutions benefit organizations more than any other file transfer alternative available. Learn more about what it is and the benefits in our blog.