-
Tyler Reguly
Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
-
Steven Sletten
News Article
TechTarget News: 7 Principles of the GDPR Explained
By Donnie MacColl on Wed, 05/08/2024
How will the GDPR affect businesses handling personal information? Donnie MacColl spoke with TechTarget News about the seven principles of GDPR.
Blog
Evolve Your Security Strategy to Prepare for DORA
By Antonio Sanchez on Thu, 07/27/2023
Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
News Article
IT Pro Case Study: Fortra Automate and Summit Credit Union
In this ITPro Today case study, find out why Summit Credit Union adopted robotic process automation (RPA) technology to streamline and improve an outdated online loan application process.
Blog
SaaS-based Data Loss Prevention
Mon, 07/04/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
News Article
Forbes: How to Reduce Your Risk of Identity Theft
What can cybercriminals do with your stolen information and how can you protect yourself from being a victim of this rising crime? Writing for Forbes, cybersecurity expert John Wilson of Fortra provides six steps to help guard against identity theft.
Press Release
Cybersecurity Software Provider Fortra Acquires Terranova Security
In this eChannelNews podcast, John Grancarich, Exec VP of Strategy, explains why Fortra recently acquired Terranova Security.
Blog
The Founders of File Integrity Monitoring: What You Need to Know About Tripwire
Fri, 04/22/2022
As one of the latest additions to the Fortra portfolio, Tripwire adds integrity monitoring to an already broad set of capabilities offered. Here is Tim’s explanation of integrity monitoring and how it helps customers.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
News Article
Three Cybersecurity Practices for Organizations in 2022
With the threat of cyber-attacks only expected to get worse, organizations need to incorporate better cybersecurity in 2022. Here are three cybersecurity practices that organizations should incorporate in 2022.
On-Demand Webinar
Analyze Traffic Flow with a Bandwidth Monitoring Tool
Identify bandwidth hogs and traffic congestion with a NetFlow analyzer. Find out how Intermapper can help.
On-Demand Webinar
Application Monitoring from Every Angle
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
Article
Adding Flexibility to IBM i Monitoring Without Compromising Availability
By Kurt Thomas on Tue, 06/01/2021
To cope with system issues, you want easy yet comprehensive solutions that handle your performance, messaging, and remote management needs, but what you really need are integrated solutions for universal control. See where Robot Monitor fits in.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Article
Best Automation Practices for Robot Console
By Tom Huntington on Mon, 05/17/2021
When you apply rules to system events, automation software like Robot Console works like the autopilot on a boat or plane—it steers the system through the night or the weekend while you rest.
Guide
A Guide to IBM i Message Management
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.