Resources

Datasheet

Halcyon for Managed Service Providers

Fortra Takes Your Managed Services to the Next Level In today’s economy, managed service providers try to get by with what they have, but that doesn’t mean that there isn’t something better out there. Whether you host your customers’ systems in your data center or provide remote monitoring or cloud-based services, Fortra has a technical solution and a commercial model to suit...
Datasheet

IBM i Server Suites

See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet

Trap Receiver

Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Guide

Free eBook: Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their...
Datasheet

Powertech SIEM Agent for IBM i

Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Guide

The Ultimate Guide to Investing in Secure File Transfer Software

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex.  In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions....
Guide

6 Users to Put on Your Security Watch List

Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about. Sometimes, security threats come from the inside. In this ebook, you'll learn about eight user types we...
Datasheet

Enterprise Console

View alerts generated on IBM i, AIX/VIOS, Linux, and Windows servers on a single, modern, centralized, graphical console. Plus, use Enterprise Console to receive SNMP traps from devices and software—both Fortra software and tools from other vendors. Simplify Enterprise Management Enterprise Console provides a real-time focal point for your IT infrastructure monitoring...
Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled.   ...
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...