Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
The Top 5 Benefits of Remote Network Monitoring
By Kevin Jackson on Mon, 06/10/2024
If your network equipment is located in multiple locations, or your IT team wants to monitor the network on-the-go, remote network monitoring can help.
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Blog
Free Backup Management Software vs. Paid – Which Is Right for Me?
By Debbie Saugen on Mon, 03/04/2024
When is the right time to rely on an Option 21 save and when should I turn to an enterprise-class solution like BRMS or Robot Save? Read on to find out.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Article
What is Intelligent Process Automation (IPA)?
By Ravi Dirckze on Tue, 01/09/2024
Text
In nearly all industries, artificial intelligence (AI) is held up as the vision for the future, with the promise to transform every aspect of business. But not all hype lives up to reality....
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Tue, 12/05/2023
Now more than ever, securing your infrastructure is critical to the success of your organization.
Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Blog
Generative AI in Cybersecurity
By Antonio Sanchez on Tue, 09/12/2023
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Case Study
Portmade NV Saves Time and Labour Creating Customs Declarations with Automate
Learn how Portmade NV uses intelligent automation to capture, extract, and import data on customs declarations forms, saving the equivalent of 3.5 FTEs.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
On-Demand Webinar
Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i
By Rohit Mathur
The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them.
Watch our webinar...
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.