Resources

Press Release

Second Marriott Data Breach Affects 5.2M Guests

Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Article

Mobile NOW for Robot Network

The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Article

Mobile Dashboards for IBM i Monitoring

Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
Datasheet

Powertech Risk Assessor for IBM i

Powertech Risk Assessor for IBM i automates the process of gathering security information. Schedule a demo today.
Datasheet

Powertech Database Monitor for IBM i

Powertech Database Monitor for IBM i leverages IBM i to automate, streamline, and centralize your database monitoring while providing full notification, authorization, reporting, and regulatory compliance capabilities. Schedule a demo today.
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Datasheet

VCM

VCM allows you to get insight into your hybrid IT infrastructure, eliminate wasted spend, and prevent problems before they occur.
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?