Resources

Blog

Single Sign-On and the Dangers of Active Directory

Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

IBM i: The Backbone of the Banking Industry

Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Blog

The History of Run Book Automation

Automating the run book is a huge productivity increase for the oeprations team in any data center. Find out what the Fortra experts have to say about the history of run book automation.
Blog

The 5 Key Metrics to Improve Your Data Center Workflows

You’re already managing thousands of workflows, batch jobs, and other background processes using the same staff and tools you’ve had for years, but business demands keep adding more to your plate. You know you need to optimize, improve visibility, and start justifying the cost of new resources before it’s too late.