Blog
The Pros & Cons of Network Diagrams
Mon, 04/22/2019
Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams.
s Not Loading? Check out the Text Version
Keeping your network up and running can seem like an uphill battle. Especially without...
Blog
Why Does EdTech Matter to a Network Admin?
Tue, 04/16/2019
As chalkboards give way to computer screens and other devices, like smartboards and tablets, it’s important to understand IT’s impact of embracing educational technology.
Blog
What is Forms Management Software?
By Greg J. Schmidt on Tue, 04/16/2019
Find out how forms management differs from document management. You’ll get real-life examples of forms management in practice, plus tips for getting started.
Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.
Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
What Can You Monitor on Your Campus Network?
Thu, 03/14/2019
The better question is, what can't you monitor on campus? Intermapper provides network monitoring for your school for anything with an IP address. Check out the infographic to see examples of the possibilities.
PRINT THE INFOGRAPHIC
...
Datasheet
Intermapper Getting Started Training Overview
The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment.
Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
On-Demand Webinar
Get to Know Intermapper in 15 Minutes
What is Intermapper, and why should I choose it? Watch this brief 15-minute overview and find out what makes Intermapper special and how easy it is to get started.
Blog
Bridging the Gap Between Cloud and On-Premises Devices When Monitoring Hybrid IT
Wed, 11/14/2018
Learn how network monitoring can help you bridge the gap between on-premises and cloud devices when monitoring hybrid IT environments.
Datasheet
Security Scan for IBM i
Security Scan for IBM i is a free service centered on Fortra’ expertise with the IBM i platform and its unique security concerns.
Datasheet
Robot Space
Bring Automation and Analysis to Your IBM i Disk Space Administration. Schedule a demo of Robot Space today.
Datasheet
Powertech Exit Point Manager for IBM i
Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today.
Your Greatest Threat May Come from Within
In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Blog
Network Monitoring for Government Agencies: Areas of Focus
Thu, 08/30/2018
Network monitoring is crucial to ensuring a healthy network with maximum uptime for your users. But as a government agency, it’s even more critical.
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.