Blog
Network Monitoring and Identity Governance: How They Work Together to Enhance Your Security Posture
By Kevin Jackson on Thu, 07/15/2021
Discover three key areas where network monitoring and identity governance strategies go hand-in-hand, and work collaboratively to improve and enhance security within organizations today.
Article
15 Tips for When It's Time to Upgrade Your Network
By Kevin Jackson on Wed, 07/14/2021
While every network faces different challenges, we’ve identified three key areas that are currently seeing the most change for organizations needing to grow their network infrastructure.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
HelpSystems’ (now Fortra's) Steph Charbonneau Discusses Data Security, Corporate Culture, and More
Tue, 06/29/2021
Data security, corporate culture and more are discussed by Fortra’ Steph Charbonneau on popular blog, ModernCTO.
Blog
Data Classification Best Practices
Mon, 06/14/2021
Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.
On-Demand Webinar
Application Monitoring from Every Angle
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
Blog
The Internet of Things: What's the Impact on IT Admins?
By Kevin Jackson on Thu, 06/03/2021
What does the growing Internet of Things mean for your network admins? Learn key challenges as well as our top tips for monitoring your network during this ever-changing time.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Article
Adding Flexibility to IBM i Monitoring Without Compromising Availability
By Kurt Thomas on Tue, 06/01/2021
To cope with system issues, you want easy yet comprehensive solutions that handle your performance, messaging, and remote management needs, but what you really need are integrated solutions for universal control. See where Robot Monitor fits in.
Article
Application and Resource Issues: No More Hunting & Fishing on IBM i
By Kurt Thomas on Tue, 06/01/2021
Use a real-time monitoring tool with thresholds and drill-down capabilities to speed root cause analysis and problem determination for application and resource performance issues on IBM i.
Article
Job Status and Other Stories About Application Monitoring
By Kurt Thomas on Tue, 06/01/2021
Knowing a job’s CPU usage, disk I/O, temporary storage, and so on is fine, but what you really want to know is how the job is doing. And we can see a job's status on IBM i. Here's how.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Guide
Penetration Testing Toolkit
Safeguard your infrastructure and data
With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources...
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog
What does CUI mean for government agencies?
Fri, 05/21/2021
Adam Strange, global marketing director at Titus, by Fortra, discusses what Controlled Unclassified Information (CUI) means for government agencies.
Blog
The Evolution and Advancement of Penetration Testing Under Covid-19
Fri, 05/21/2021
Brian Wenngatz, general manager at Core Security, a Fortra company, discusses the advancement of penetration testing during Covid-19.
Guide
2021 Pen Testing Survey Report
Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose.
The 2021 Pen Testing Report highlights...
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.