Resources

News Article

MySecTV: Advancing as a Cybersecurity Ally

Anirudh Chand, Head of Solutions Engineering, Asia Pacific and Japan, spoke to MySecTV about the cybersecurity landscape in his region and how Fortra helps strengthen customers’ security maturity with a comprehensive solution portfolio.
Article

Optimizing Containers, Kubernetes and OpenShift

The container deployment model offers component autonomy, elasticity, and scalability in a way that no other framework has done before. But to reap the benefits, you need to adopt new ways of managing and optimizing your environments and their underlying resources. Learn how to manage the performance and resource planning of container workloads.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article

Comparing Different Methods for Calculating Health and Risk

How do you calculate IT health and risk? There are different methods you can use, depending on your needs. The most common methods for determining IT infrastructure health are: Threshold comparison Enhanced threshold comparison Event detection Variation from normal Allocation comparison Queuing theory for health On the other hand, the most common methods for calculating IT...
Article

A Roadmap for Consolidation

There are five key steps when planning a consolidation strategy. Considerations for each step are outlined below.
Article

Fortra Product Lifecycle Phases

Consult this guide to product lifecycle phases in order to understand how your software developed and supported.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article

Global IT Management Survey 2016—NewsWorthy Analysis

Results of a Kelton survey in which IT departments in large enterprises are tasked with responding to numerous business-impacting issues on any given day, including equipment failures, fluctuating website demand, and data security.