Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
Datasheet
LEVEL 4: Operations Center Suite
Does This Sound Familiar?
How would you answer the following questions?
Can you schedule highly complex job streams and track them across different IBM i systems or servers?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or users and take...
Datasheet
LEVEL 3: Advanced Automation Suite
Does This Sound Familiar?
How would you answer the following questions?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action?
Can you automate disk space management, freeing technical resources for other...
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Thu, 05/19/2022
Digital Rights Management tools can help give your organization the highest level of control and visibility possible over its data. Here are 4 ways to use it.
On-Demand Webinar
Halcyon Features for Large Environments
Watch this webinar and learn how to leverage Halcyon monitoring software in large environments such as managed service providers (MSPs) and companies with multiple IBM i environments.
Datasheet
Level 2: Systems Operations Suite
What Is Level 2: Systems Operations Suite?
Level 2 of the Halcyon IBM i Server Suites, Systems Operations Suite offers powerful and highly functional automation features for even tighter control of mission-critical business applications and processes. This solution provides total peace of mind that your IBM i is running at its full potential and maximizing system uptime for your business.
Level...
Datasheet
Level 1: Message Management Suite
Level 1 of the Halcyon IBM i Server Suites, Message Management Suite is an entry-level system monitoring and automation solution for the IBM i operating system. Unlike the basic system reply list that ships with IBM i servers, Level 1 addresses the fact that system-critical information messages often go unnoticed on a busy system.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
Article
All About Alert Intelligence
By Andrew Bullivant on Thu, 02/13/2020
Thanks to intelligent filtering, the Alert Intelligence feature included in IBM i Server Suite improves the quality of IBM i alerts while reducing the quantity, providing increased application availability and system uptime.
Article
Availability Reporting for Managed Service Providers
By Paul Ratchford on Wed, 02/12/2020
Proving that you are meeting service-level agreements shouldn’t be a wasted effort. In fact, it should strengthen your relationship with clients and help your team manage performance in the future. See how.
Article
Log File Monitoring in IBM i Server Suite
By Paul Ratchford on Mon, 01/27/2020
Log File Monitor can monitor the contents of files in the integrated file system (IFS) and raise alerts based on this content. Read on to learn more.
Datasheet
Halcyon for Managed Service Providers
Fortra Takes Your Managed Services to the Next LevelIn today’s economy, managed service providers try to get by with what they have, but that doesn’t mean that there isn’t something better out there. Whether you host your customers’ systems in your data center or provide remote monitoring or cloud-based services, Fortra has a technical solution and a commercial model to suit your business...
Datasheet
IBM i Server Suites
See Halycon's four IBM i software suite levels designed to run natively on your IBM i. Select the suite level that is right for your operations with confidence.
Datasheet
Trap Receiver
Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.