Blog
Ask a Capacity Management Expert (Webinar Recap)
By Per Bauer on Wed, 10/03/2018
Get the answers to some of the hottest capacity management questions.
Blog
Your IFS Is Probably a Treasure Trove of Unsecured Data
Wed, 09/12/2018
Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Blog
Tips for Managing Physical, Virtual, Cloud Environments
By Per Bauer on Thu, 08/30/2018
IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud.
It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible.
With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to diagnose and...
Blog
The Ultimate Guide to Investing in Secure File Transfer Software
By Bob Luebbe on Thu, 08/23/2018
Are you struggling to secure your file transfers? Need to invest in secure file transfer software but aren’t sure where to look? We’ve got you covered. Walk through the buying process, from start to finish, with this free Ultimate Secure Managed File Transfer Buyer’s Guide.
Case Study
Fortra Protects the COMP Performance Group from Viruses and Malware
The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software.
After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Blog
When Would You Notice an IBM i Security Breach?
By Robin Tatam on Fri, 08/03/2018
Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!
Blog
Making the Best Capacity Management Tool Even Better
By Scott Adams on Mon, 07/16/2018
The best capacity management tool just got better. With just one tool, manage your entire hybrid IT environment, prevent outages, and keep services up and running.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Blog
How to Do Cloud Capacity Planning
Tue, 04/24/2018
Operating in the cloud can have some great benefits compared to operating with on-premises software. That’s why surveyed IT professionals predict 83% of enterprise workloads will be in the cloud by the year 2020.
Blog
How Spectre and Meltdown Affect Power Systems Servers
Thu, 02/08/2018
The Spectre and Meltdown vulnerabilities do affect Power Systems servers. Fortra security expert explains what we know so far and how you can stay up-to-date on patches released by IBM.
Blog
What is a Capacity Management Maturity Model?
By Per Bauer on Sat, 01/20/2018
Demands for services are increasing. High performance and reliability are expected. Yet budgets, labor and floor space are all being constrained. That’s where capacity management comes in. Capacity management can improve efficiency and guarantee reliability of your business systems.
Blog
NIST’s Surprising New Password Recommendation
By Robin Tatam on Fri, 01/05/2018
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog
Hidden Dangers of the Lesser-Known IBM i Special Authorities
Fri, 01/05/2018
Everyone’s aware of the dangers of *ALLOBJ, *SECADM, and *SPLCTL special authorities. But what about the rest? Fortra security expert explains the issues you should be aware of when assigning the other special authorities.
Blog
Capacity Management in Operations Management [Webinar Recap]
Wed, 12/06/2017
Learn where capacity management fits into operations management today—especially as organizations move into the cloud.
Blog
Could IBM i Have Been Part of the Equifax Breach?
Tue, 11/28/2017
If IBM i was part of the Equifax data breach, what could that organization have done to protect their data? Fortra security expert has some ideas.