On-Demand Webinar
Combating Ransomware: Building a Strategy to Prevent and Detect Attacks
By Bob Erdman
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
Article
Eight Different Ways to Use HA at My Organization
By Tom Huntington on Wed, 04/14/2021
A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
On-Demand Webinar
Virtual Tape Library (VTL) Technology for IBM i
During this 1-hour session, Fortra and LaserVault experts join forces to discuss the merits of virtual tape and show you how VTL technology can replace your traditional tape backups.
On-Demand Webinar
Security Bulletin: Malware Infection Discovered on IBM i Server!
By Sandi Moore
Noted IBM i security expert Sandi Moore explains the facts about viruses on IBM i. Watch and learn how to ensure you're fully protected.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
Guide
Robot in Modern IBM i Environments
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Blog
Realize ROI with Robot
By Tom Huntington on Sun, 03/28/2021
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog
Five Steps for Successful IBM i Role Swaps
By Tom Huntington on Fri, 03/26/2021
Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Guide
Why Should You Monitor IBM MQ?
IBM MQ is a middleware product that allows messages (think data or information) to be sent and received to and from similar or dissimilar platforms with guaranteed delivery. Read this guide to learn the value of monitoring IBM MQ.
On-Demand Webinar
Journaling for Db2 and IFS
During this recorded webinar, the IBM i experts from Fortra help you get a better understanding of how journaling works.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
On-Demand Webinar
Streamline the Day-to-Day with IT Automation
Thu, 01/14/2021
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Blog
The Ultimate Checklist for Purchasing File Encryption Software
By Brian Pick on Fri, 11/20/2020
Encryption software helps organizations to safeguard the data they collect, store, and share. Discover the ultimate checklist of what to look for in file encryption software before purchasing.
Product Video
Watch a Demo of Powertech Antivirus
Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures.
In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing:
Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and...
Blog
How to Implement the Right Enterprise File Sharing Solution
By Heath Kath on Mon, 11/16/2020
Implementing the right enterprise file sharing solution for your organization can be a stressful task. Check our list of tips to help make the process of finding the right file sharing tool easier.
Blog
19 Ways to Transfer Big Files
By Heath Kath on Fri, 11/13/2020
Transferring big files doesn’t have to create big hassles when you look for software solutions, like MFT, that can handle large files with ease and security.