On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
Blog
Key Functionality of a Great Cybersecurity Software Solution
Mon, 04/08/2019
Evaluating and implementing cybersecurity software requires diligence. And if your InfoSec team is short staffed, choosing the right tools is more important than ever.
Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Video
5 IBM i Security Quick Wins
By Sandi Moore
IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.
Blog
Is There Such a Thing as Free Antivirus for Businesses?
By Bob Erdman on Tue, 11/06/2018
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
Blog
Malware, Virus, Anti-malware, Antivirus: What’s the Difference?
By Bob Erdman on Tue, 10/30/2018
Read on to find out the difference between malware and a virus, and how you can best protect your organization from them.
Blog
Is Antivirus Really Necessary for Linux?
By Bob Erdman on Tue, 10/23/2018
As evidenced by XBash and Kodi add-on malware, the myth that Linux is immune to viruses could not be further from the truth. In reality, Linux is becoming a lucrative target.
On-Demand Webinar
An Introduction To Cybersecurity
By Robin Tatam
In this session, security expert Robin Tatam covers cybersecurity basics, including compliance issues, preventing breaches, and the future of data protection.
Press Release
Weak Internal Security Causes Weak External Security
Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Press Release
HelpSystems (now Fortra) Extends Security Monitoring to Amazon S3
Policy Minder has been expanded to empower security monitoring for data stored on Amazon S3, giving IT professionals peace of mind any misconfigurations or oversights will be detected and rectified.
Blog
When Would You Notice an IBM i Security Breach?
By Robin Tatam on Fri, 08/03/2018
Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Getting Started with IBM i Security: Object Authority
Wed, 07/11/2018
Get a better understanding of how IBM i default authority values work and how you can minimize security gaps around them.
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities