Resources

On-Demand Webinar

Determining the Best Approach to PAM for You

David Dingwall provides an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.
On-Demand Webinar

An Introduction To Cybersecurity

In this session, security expert Robin Tatam covers cybersecurity basics, including compliance issues, preventing breaches, and the future of data protection.
On-Demand Webinar

The Effects of Cloud Migration on IAM, PAM, and Audit

With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
Press Release

Weak Internal Security Causes Weak External Security

Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
On-Demand Webinar

Getting Started with IBM i Security: System Values

Security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. View this on-demand webinar to get guidance on their best practice settings.
On-Demand Webinar

Controlling Insider Threats on IBM i

Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.