Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
On-Demand Webinar
What Is Your Data Trying to Tell You?
Watch this recorded webinar to learn how to translate and deliver lots of data from IBM i and other sources into clear and actionable stories
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
Blog
What Is NVMe?
By Randy Watson on Thu, 04/01/2021
NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
Article
VIOS Performance Monitoring Commands
By Chuck Losinski on Wed, 03/10/2021
You might think VIOS is set and forget, but it’s not. Luckily, VIOS includes a number of command line utilities to help you obtain performance-related information from your VIOS partitions.
On-Demand Webinar
IBM i Access Client Solutions for Data Access
During this recorded webinar, the IBM i experts from Fortra help you get a better understanding of Access Client Solutions (ACS).
On-Demand Webinar
Sequel Client Tables (a.k.a. Pivot Tables on Steroids)
Everything and anything around Client Tables in Sequel is covered in this on-demand webinar.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
On-Demand Webinar
5 Myths About Encryption on IBM i
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
IBM i Data Encryption: What, Why, and How
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
How to Transfer IBM i Data to Microsoft Excel
During this recorded webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
On-Demand Webinar
Streamline the Day-to-Day with IT Automation
Thu, 01/14/2021
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Article
Key Management and Strong Encryption For PCI DSS Compliance With Powertech Encryption for IBM i
By Bob Luebbe on Tue, 12/29/2020
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.
Blog
3 Reasons to Go Beyond Writing Queries in SQL
Sun, 11/29/2020
Still writing queries in SQL? Sure, it’s a powerful way to access IBM i data. But is it enough?
Blog
The Ultimate Checklist for Purchasing File Encryption Software
By Brian Pick on Fri, 11/20/2020
Encryption software helps organizations to safeguard the data they collect, store, and share. Discover the ultimate checklist of what to look for in file encryption software before purchasing.
On-Demand Webinar
How to Work with Data from IBM i and Remote Databases
Watch this webinar to get insights from our expert on bringing data all together into one solution and work with it easily.
Blog
How to Implement the Right Enterprise File Sharing Solution
By Heath Kath on Mon, 11/16/2020
Implementing the right enterprise file sharing solution for your organization can be a stressful task. Check our list of tips to help make the process of finding the right file sharing tool easier.