Resources

Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z,...
Guide

Cybersecurity Insiders 2021 Malware Report

Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies. The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings: More respondents...
On-Demand Webinar

Simplify Processes with PowerShell RPA

You don't have to manually schedule PowerShell scripts anymore. Watch the webinar to learn how you can easily automate critical PowerShell processes with RPA.
Guide

Download "A Guide to Practical Single Sign On"

    The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple. With single sign on (SSO), you can eliminate passwords—and the cost associated with them—by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to...
On-Demand Webinar

Bridge the Gap Between IT and Business: How to Engage the Business in Digital Transformation

An estimated 60 to 70 percent of initial robotic process automation (RPA) projects fail to meet expectations. Companies want to embrace the transformative technology, but with no sense of where to start and what processes to automate, their projects are dead on arrival.   Business and IT need to partner together to find strong initial candidates for automation that return...
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. ...
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included...
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

    Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work,...