Resources

Blog

The Pros & Cons of Network Diagrams

Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams. s Not Loading? Check out the Text Version Keeping your network up and running can seem like an uphill battle. Especially without...
Blog

Why Does EdTech Matter to a Network Admin?

As chalkboards give way to computer screens and other devices, like smartboards and tablets, it’s important to understand IT’s impact of embracing educational technology.
Blog

The Pros and Cons of Scripting

There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
Blog

What Can You Monitor on Your Campus Network?

The better question is, what can't you monitor on campus? Intermapper provides network monitoring for your school for anything with an IP address. Check out the infographic to see examples of the possibilities. PRINT THE INFOGRAPHIC ...
Datasheet

Intermapper Getting Started Training Overview

The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment. Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
Datasheet

Powertech Risk Assessor for IBM i

Powertech Risk Assessor for IBM i automates the process of gathering security information. Schedule a demo today.
Datasheet

Powertech Encryption for IBM i

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Product Video

Intermapper Feature Tour

Don't have time to join our live webinar? Get the Intermapper Feature Tour on-demand! Intermapper network monitoring software is both powerful and easy to use. Get visibility into real-time network performance with our flexible network mapping and monitoring solution for all your physical and virtual equipment. Let Kevin Jackson, our Technical Solutions Consultant, give you a guided tour. Watch...
Datasheet

Powertech Encryption for IBM i Compliance Datasheet

Satisfy Stringent Requirements for Encryption and Key Management Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...