Resources

Datasheet

Powertech Identity Manager for IBM i

Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
Datasheet

Powertech Password Self Help for IBM i

Powertech Password Self Help for IBM i enables users to reset their own IBM i passwords immediately, improving user productivity and reducing the demand placed on IT. Schedule a demo today.
Datasheet

Enterprise Console

View alerts generated on IBM i, AIX/VIOS, Linux, and Windows servers on a single, modern, centralized, graphical console. Plus, use Enterprise Console to receive SNMP traps from devices and software—both Fortra software and tools from other vendors. Simplify Enterprise Management Enterprise Console provides a real-time focal point for your IT infrastructure monitoring regardless of host...
Blog

NIST’s Surprising New Password Recommendation

For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Datasheet

Intermapper Remote Access

Intermapper Remote Access extends the reach of Intermapper by giving you and your staff access to maps, submaps, and configuration options, regardless of your location.
Case Study

How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation

What if you could reduce an eight-hour outage… to no time at all? That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Blog

Your Biggest Challenge to IBM i User Onboarding

As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Guide

Download “Identity & Access Management for IBM i”

      Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...