Resources

Blog

Evolve Your Security Strategy to Prepare for DORA

Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
News Article

Forbes: How to Reduce Your Risk of Identity Theft

What can cybercriminals do with your stolen information and how can you protect yourself from being a victim of this rising crime? Writing for Forbes, cybersecurity expert John Wilson of Fortra provides six steps to help guard against identity theft.
Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
On-Demand Webinar

Quick and Easy IBM i Disk Space Management

Studies show that the amount of data stored worldwide will grow by 4,300% within 7 years. 80% of that growth is on enterprise servers like your IBM i. If you want to be prepared to manage that kind of big data, watch this webinar!
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article

Is the i Ready for the Three Vs of Big Data?

The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).
Case Study

For Centralized Data Processing, KeHE Relies on Fortra

As the nation’s leading distributor of natural, organic, specialty, ethnic, and gourmet food products, KeHE Distributors has helped thousands of retailers—from the smallest independent stores to the largest supermarket chains—meet the constantly growing demand for products that help people to live well. John Kinnaird is the National Operating Center Manager responsible for supporting both hardware...
Case Study

Lamps Plus Reduces Overtime Using Automation Solutions from Fortra

Established in 1976, Lamps Plus has brought excellence to the retail lighting industry for more than 35 years. Today, they are the nation’s largest specialty lighting company with more than 40 superstores throughout the western United States. They serve over five million customers a year with functional and decorative lighting products, in-home lighting consultations, in-store lighting seminars...