Blog
Automated Capacity Forecasting Using Predictive Analytics and Machine Learning
By Per Bauer on Mon, 06/07/2021
Better understand the different options for capacity forecasting and their characteristics, including using predictive analytics and machine learning. And learn how to choose the optimal forecasting method based on your business needs and maximize the accuracy and value of your planning efforts.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
On-Demand Webinar
Jumpstart Your Cost Optimization Project
By Per Bauer
When exciting new services get underway, IT can be reduced to a cost center. In an effort to keep services up, leadership adopts a “performance at any cost” mindset and allocates more resources than necessary as an insurance policy against downtime.
But this is not a sustainable strategy, and especially in times like these, your organization needs to focus on controlling costs in every area of...
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
Blog
What Is NVMe?
By Randy Watson on Thu, 04/01/2021
NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
On-Demand Webinar
5 Myths About Encryption on IBM i
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
IBM i Data Encryption: What, Why, and How
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
Streamline the Day-to-Day with IT Automation
Thu, 01/14/2021
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Article
Key Management and Strong Encryption For PCI DSS Compliance With Powertech Encryption for IBM i
By Bob Luebbe on Tue, 12/29/2020
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.
Blog
The Ultimate Checklist for Purchasing File Encryption Software
By Brian Pick on Fri, 11/20/2020
Encryption software helps organizations to safeguard the data they collect, store, and share. Discover the ultimate checklist of what to look for in file encryption software before purchasing.
Blog
How to Implement the Right Enterprise File Sharing Solution
By Heath Kath on Mon, 11/16/2020
Implementing the right enterprise file sharing solution for your organization can be a stressful task. Check our list of tips to help make the process of finding the right file sharing tool easier.
Blog
19 Ways to Transfer Big Files
By Heath Kath on Fri, 11/13/2020
Transferring big files doesn’t have to create big hassles when you look for software solutions, like MFT, that can handle large files with ease and security.
Blog
What is File Encryption Software?
By Heath Kath on Tue, 11/10/2020
File encryption software is a tool that encodes data for better security. Encryption is essential to both cybersecurity and compliance. Learn how file encryption software is used to safeguard data worldwide.
On-Demand Webinar
Encryption on IBM i Simplified
By Robin Tatam
DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Blog
What is Electronic File Transfer?
By Heath Kath on Thu, 10/22/2020
Electronic file transfer solutions benefit organizations more than any other file transfer alternative available. Learn more about what it is and the benefits in our blog.
Blog
Why You Should Use Scheduled File Transfer Software
By Brian Pick on Thu, 10/22/2020
Scheduled file transfers make your life easier. Rather than manually executing task after redundant task, let file transfer software handle the nitty gritty – all while boosting your reliability, security, and scalability.