Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
The Truth About Viruses on Linux
By Bob Erdman
This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar
Everything You Need to Know About RPA in 30 Minutes
By Pat Cameron
If you’re hearing terms like digital workforce, software robot, and automation center of excellence, but aren’t sure what it all means, this webinar is for you. Learn about the advantages of automation with RPA, real-life robotic process automation use cases, and common RPA terminology.
On-Demand Webinar
2 True Tales of HA/DR Success on IBM i
Hear how Nesco Resource and Furuno USA use Robot HA for IBM i data replication. Watch this recorded webinar!
Article
PowerHA for SAP—A Winning Combination
By Tom Huntington on Thu, 05/31/2018
What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
On-Demand Webinar
Sync Your SharePoint Processes with Automation
Automation is a great way to streamline your SharePoint processes. Watch the webinar to learn how to keep these documents and information synced with the rest of your corporate data.
On-Demand Webinar
Survey Results: Cybersecurity Risk Mitigation Strategies
By Robin Tatam
Fortra surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection. Get the results in this on-demand webinar.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Blog
Cloud Misconfiguration and the Curse of the Inadvertent Employee
By Bob Erdman on Fri, 04/20/2018
There is a new term IBM and other industry experts have begun to use: the inadvertent employee. These are the well-meaning IT professionals who are often at fault when it comes to misconfigured servers, networks, and databases.
On-Demand Webinar
Privileged Access Management for Linux, UNIX, and AIX Professionals
Learn how to protect your systems and data with a single solution that delivers granular security controls, automated workflows, and enables limitless scalability.
Article
Eight Steps Toward a Secure Hybrid Cloud Environment
Fri, 03/16/2018
Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.