Resources

Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

From Intern to Associate Data Scientist: Josh

From Software Development Intern to Associate Data Scientist, Josh is exploring exciting avenues for career growth at Fortra. He’s even pursuing a master’s degree with tuition reimbursement!
Article

What is SNMP, and How Does It Work?

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core values, and Fortra acquired Sourcio in April 2016.
Case Study

How Decatur City Schools Manages Their Growing Network with Intermapper

Through the years, there have been a lot of network changes at Decatur City Schools, a school district located in north Alabama. But one thing has remained constant, their reliance on Intermapper, the network monitoring service from Fortra.“Before Intermapper, we didn’t have any insight into what was up and what was down,” said Gary Cloer, Decatur City Schools network specialist. “We were relying...
Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Guide

A Guide to IBM i Message Management

This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.