Resources

Guide

Going Beyond the GUI

Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Guide

Download the "Webdocs Accounts Payable Automation Guide"

Image Learn About the Inefficiencies of Manual Accounts Payable (AP) Processing and How Webdocs for AP Eliminates Them  Labor expenses typically consume 62% of total accounts payable costs. In other words, AP processes are intensive and inefficient when performed manually.  Webdocs for AP's automation capabilities pave the way for...
Article

The Importance of VIOS

VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Guide

Fortra's Complete Guide to Layered Offensive Security

Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a...
Datasheet

How Fortra Supports the Zero Trust Journey

What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time...
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same...
On-Demand Webinar

IBM i Automation Series: Job Scheduling

Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are...
Datasheet

Fortra's Security & Automation Portfolios

Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that...
Guide

A Single Pane of Glass for Multi-Platform Systems Management

Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.