Resources

Blog

Does Your Business Belong in the Cloud?

The cloud is all about access. It’s about getting access on-demand, access to resources needed for your growing demands, and controlling who has access to your information. Everybody is talking about it, but is the cloud the right answer for your business needs? And if so, which one?
Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar

SCSI Is Dead, Long Live SAN

As data storage needs increase, SAN technology delivers greater flexibility. Chris Bremer, Chief Technology Officer at DSI, leads this 30-minute recorded session on what SAN is and how it works.
On-Demand Webinar

Quick and Easy IBM i Disk Space Management

Studies show that the amount of data stored worldwide will grow by 4,300% within 7 years. 80% of that growth is on enterprise servers like your IBM i. If you want to be prepared to manage that kind of big data, watch this webinar!
On-Demand Webinar

Job Scheduling: Basic to Advanced

Fortra offers two automation platforms to handle the complex scheduling needs of modern enterprises: AutoMate and Skybot. Join this live webinar to learn about using these solutions to orchestrate processes from the server down to the user’s desktop.
On-Demand Webinar

Practical Task Scheduling Deployment

One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog

Who's Afraid of IASPs?

As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...