Resources

Datasheet

Powertech Multi-Factor Authentication Compliance Datasheet

Comply with Security Standards, Including PCI DSS The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
Blog

A SIEM that Speaks IBM i

Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
Press Release

What HelpSystems (now Fortra) is Up to Now

HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down with IT Jungle at the recent COMMON PowerUp conference to talk about what’s new. HelpSystems didn’t have a single major product launch at the COMMON...
Datasheet

Event Manager

Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Schedule a demo today.
Case Study

Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400

Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
On-Demand Webinar

Deploying Multi-Factor Authentication in Your Enterprise

Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense. MFA protects you from the most common cause of a data breach: compromised...
Article

Fortra Product Lifecycle Phases

Consult this guide to product lifecycle phases in order to understand how your software developed and supported.
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog

SFTP vs. FTPS: The Key Differences

Which option for securing sensitive files in transit is the best for your organization? Read this article for an in-depth look at FTP vs. SFTP vs. FTPS, and their key differences.