On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Press Release
HelpSystems (now Fortra) Recognizes Top Partners for Dedication to Customer Success
Fortra today announced the winners of its inaugural Top Partner Awards. These prestigious accolades acknowledge the dedication and remarkable growth of companies that strive to further the Fortra brand in key markets around the globe.
Press Release
HelpSystems (now Fortra) Acquires Core Security Solutions from SecureAuth to Expand Cybersecurity Portfolio
Fortra announced today it has acquired the Core Security assets from SecureAuth. The assets acquired from SecureAuth are industry-leading solutions for identity governance and administration, penetration testing, threat detection, and vulnerability management.
Press Release
Software company HelpSystems (now Fortra) acquires Atlanta-based operation with 115 employees
Fortra has acquired the Core Security division of Irvine, Calif.-based SecureAuth Corp.
Press Release
HelpSystems (now Fortra) Acquires MVP Systems Software to Bolster Enterprise Workload Automation Portfolio
Fortra announced today that it has acquired MVP Systems Software, a leader in enterprise workload automation software
Datasheet
Powertech Identity Manager for IBM i
Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
Press Release
HelpSystems (now Fortra) Acquires Midrange Performance Group to Expand Capacity Management Portfolio for IBM i
Acquisition helps organizations better manage capacity and performance of their IT environments
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Press Release
What HelpSystems (now Fortra) is Up to Now
HelpSystems has become one the largest independent software vendors in the IBM i marketplace, with tools spanning operations, security, backup, high availability, forms management, and capacity planning. A company representative recent sat down with IT Jungle at the recent COMMON PowerUp conference to talk about what’s new.
HelpSystems didn’t have a single major product launch at the COMMON...
Press Release
HelpSystems (now Fortra) Acquires Fox Technologies to Expand Cybersecurity Portfolio
Acquisition enables organizations to protect information stored on Linux and Unix servers with identity and access management software
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Article
Fortra Product Lifecycle Phases
Tue, 05/09/2017
Consult this guide to product lifecycle phases in order to understand how your software developed and supported.
On-Demand Webinar
Disaster-Proof Your IBM i Data
Learn the essentials to address today’s top backup and recovery concerns on IBM i from leading disaster recovery expert Debbie Saugen.
Blog
Your Biggest Challenge to IBM i User Onboarding
By Robin Tatam on Mon, 03/06/2017
As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
On-Demand Webinar
A Primer on IBM i User Profiles and How To Deploy Them
By Robin Tatam
Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data.
Guide
The Ultimate Buyer’s Guide for Network Monitoring Software
What critical features should a network monitoring solution give me? How do software licensing models compare? What do trends like hybrid IT, the Internet of Things, and IT automation have to do with network monitoring?
Answer all of your questions with the help of a seasoned technology expert. In this informative, easy-to-read guide, network professional Kevin Jackson covers everything from...
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Case Study
For Centralized Data Processing, KeHE Relies on Fortra
As the nation’s leading distributor of natural, organic, specialty, ethnic, and gourmet food products, KeHE Distributors has helped thousands of retailers—from the smallest independent stores to the largest supermarket chains—meet the constantly growing demand for products that help people to live well.
John Kinnaird is the National Operating Center Manager responsible for supporting both...