In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
Fortra today announced the winners of its inaugural Top Partner Awards. These prestigious accolades acknowledge the dedication and remarkable growth of companies that strive to further the Fortra brand in key markets around the globe.
Fortra announced today it has acquired the Core Security assets from SecureAuth. The assets acquired from SecureAuth are industry-leading solutions for identity governance and administration, penetration testing, threat detection, and vulnerability management.
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down with IT Jungle at the recent COMMON PowerUp conference to talk about what’s new.
HelpSystems didn’t have a single major product launch at the COMMON...
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Boom. Disaster strikes. Now, it’s up to you to find the tape volume that contains the lost data and restore it quickly to the correct location. Luckily, recovering your IBM i data is easy with Robot Save.
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.