Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
3 Components of a Proactive Security Strategy
By Mieng Lim on Mon, 07/22/2024
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Article
What is Intelligent Process Automation (IPA)?
By Ravi Dirckze on Tue, 01/09/2024
Text
In nearly all industries, artificial intelligence (AI) is held up as the vision for the future, with the promise to transform every aspect of business. But not all hype lives up to reality....
Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
Blog
Generative AI in Cybersecurity
By Antonio Sanchez on Tue, 09/12/2023
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Blog
Understanding CVE 2023-30990: The Vulnerability Exploiting the DDM
By Amneris Teruel on Tue, 07/25/2023
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog
Workload Automation (WLA) vs. Robotic Process Automation (RPA)
Wed, 02/15/2023
Automation remains a popular technology for businesses of all kinds. Within the realm of automation, there are a lot of acronyms representing different tools and approaches—two of the most common are workload automation (WLA) and robotic process automation (RPA). As you plan your strategy, it’s important to understand the differences of workload automation vs. robotic process automation.
Both...
Article
The IT Automation Survey
Wed, 12/14/2022
Companies continue to embrace digital transformation to navigate the post-pandemic climate. From economic uncertainties to an ever-shifting job market, IT automation tools are helping organizations meet the moment. And as automation solutions - and strategies - have evolved, we wanted to take the pulse of our users and get a snapshot of the state of IT automation and what’s top of mind as they...
Blog
Automation vs Hyperautomation: Learn the Differences
Thu, 11/10/2022
Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation.
Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Case Study
Portmade NV Saves Time and Labour Creating Customs Declarations with Automate
Learn how Portmade NV uses intelligent automation to capture, extract, and import data on customs declarations forms, saving the equivalent of 3.5 FTEs.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.