Resources

Datasheet

Powertech Antivirus for IBM i

Native Protection for IBM i Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus. Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Datasheet

Powertech Antivirus

Powertech Antivirus offers the power and protection of an industry-leading scan engine while supporting the specific features of your operating systems. Schedule a demo today.
Guide

DMZ Secure Gateways: Secret Weapons for Data Security

Exchanging a high workload of files with customers, employees, and trading partners is common in today's global economy. Add various data security standards to the mix, like PCI DSS, HIPAA, and the GDPR, and protecting sensitive data becomes a challenge many organizations struggle to overcome.In an effort to simplify how file transfers are retrieved, many IT teams install file sharing servers (e.g...
Guide

The Ultimate Guide to Investing in Secure File Transfer Software

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover:The benefits...
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Article

How to Download an ODBC Driver

Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article

FAQs about Performance Navigator

Will this product hurt the performance of my IBM i®? You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service. How is Performance Navigator compared to PM? Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services. Performance Navigator...
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar

Simple Strategies for In-Depth Malware Defense

In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
On-Demand Webinar

Deploying Multi-Factor Authentication in Your Enterprise

Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense. MFA protects you from the most common cause of a data breach: compromised...
Case Study

Appvion Improves Customer Satisfaction with a Digital Document Repository

Appvion, Inc. manufactures paper—thermal, carbonless, security, inkjet, digital specialty and colored papers. But this Appleton, Wisconsin-based company had a problem when it came to digital documents in their customer web portal. Their existing system just wasn’t up to snuff. It was time to make a change. ...
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.