News Article
Expert Insights: Alert Logic and Digital Guardian Recognized in Top Solution Awards Q4 2023
Wed, 11/29/2023
Fortra’s Alert Logic Managed Detection and Response and Digital Guardian Data Loss Prevention have been recognized in Expert Insights’ “Top Solution” awards for Q4 2023.
Guide
Penetration Testing Toolkit
Safeguard your infrastructure and data
With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources...
Guide
2021 Pen Testing Survey Report
Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose.
The 2021 Pen Testing Report highlights...
Article
The 2020 MFT Data Quadrant Report is Here
By Brian Pick on Wed, 10/07/2020
With a new year brings a new Info-Tech Managed File Transfer Data Quadrant Report. Find out about our ranking here.
Article
How GoAnywhere MFT Can Support You During COVID-19
By Brian Pick on Fri, 06/05/2020
Due to COVID-19, workforces are now more remote than ever. Unfortunately, this means sensitive data is likely not as safe as it should be. Secure MFT solutions are a proactive practice to implement.
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool!
In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
Guide
The Ultimate Guide to Investing in Secure File Transfer Software
We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex.
In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover:
The...
Guide
6 Users to Put on Your Security Watch List
Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about.
Sometimes, security threats come from the inside.
In this ebook, you'll learn about eight user types we think you should put on...
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Article
Using NFS with Webdocs – iSeries
Tue, 01/24/2017
Webdocs – iSeries references the documents it stores by an IFS (Integrated File System) path. There is, however, no requirement that the IFS path refer to a file system on local disk. In fact, for many Webdocs iSeries implementations, it is advantageous to store some or all of the documents from Webdocs on remote file systems that are shared using NFS (Network File System) and mounted into the IFS...
Article
Detect Devices Your Way in Intermapper 6.1
By Kevin Jackson on Thu, 11/24/2016
Intermapper 6.1 makes detecting new devices easier, more accurate, and faster than ever. Get a full review of Intermapper 6.1’s features and how to try them out.
Guide
10 Steps to Streamline the Deployment of Network Monitoring Software for SMBs
10 tips to help small to medium-sized businesses save time during the installation and configuration of network monitoring software.
Guide
Top 8 Reasons SMBs Need to Monitor their Networks
Read the top 8 reasons small-to-medium-sized businesses (SMBs) should implement network monitoring tools.
Article
How Network Monitoring and Document Management Work Together
By Kevin Jackson on Wed, 08/24/2016
Maximize productivity and amp up your security by using network monitoring and document management solutions together.
Article
Dealing with Temporary Files in WebDocs iSeries
Thu, 07/28/2016
WebDocs iSeries uses the IFS directory /RJSTEMP and the library RJSTEMP to store information and files temporarily. In general, it will attempt to clean up after itself, but there are situations which arise that do not perform clean up operations. As a result, files will gradually accumulate, taking up disk that could otherwise be used for other processes.
The RJSTEMP library
The RJSTEMP isn’t...
Article
Advanced Troubleshooting in WebDocs iSeries
Thu, 07/28/2016
As a WebDocs iSeries administrator, if something goes wrong your users will look to you to find, and fix, the matter. Simply knowing where to look when an initial error message is unclear can resolve a huge percentage of difficulties.
Article
Considerations For Securing NFS Shares For Use With Webdocs iSeries
Mon, 06/27/2016
NFS has long had a tentative relationship to security. As with its cousin, CIFS/SMB (more commonly know as Windows File Sharing), security was not an area of primary focus. The elements of security that exist are significant, but they are nontrivial to implement, particularly across operating systems and with third-party applications.