Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
Article
How Do I Make My Work on IBM i Look Good So My Company Doesn’t Ditch the Platform?
By Donnie MacColl on Wed, 09/11/2019
The good old green screen is no longer your safety blanket. In fact, it could be the final nail in the coffin for IBM i at your company. Consider this your wakeup call from Donnie MacColl.
Article
Mobile NOW for Robot Network
By Chuck Losinski on Wed, 08/21/2019
The web interface for Robot Network is a browser-based tool that uses Fortra Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.
Article
Mobile Dashboards for IBM i Monitoring
By Chuck Losinski on Wed, 08/07/2019
Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
Case Study
SQL SCHEDULING GOES ENTERPRISE
Company Background
Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study
SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS
Company Background
SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people.
The company’s products are widely distributed through...
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Article
Mobile Management for Your Job Schedule
By Chuck Losinski on Wed, 02/13/2019
Your job schedule has never looked so good! Learn about four must-have features exclusive to the web interface for Robot Schedule.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your AIX Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
Blog
User Groups, and Forums, and Blogs, Oh My: Top 7 Linux Resources to Increase Your Expertise
By Bob Erdman on Mon, 01/14/2019
Find what you need in our compiled list of Linux resources.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.