Resources

Blog

The Pros & Cons of Network Diagrams

Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams. s Not Loading? Check out the Text Version Keeping your network up and running can seem like an uphill battle. Especially without...
Blog

Why Does EdTech Matter to a Network Admin?

As chalkboards give way to computer screens and other devices, like smartboards and tablets, it’s important to understand IT’s impact of embracing educational technology.
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Blog

What Can You Monitor on Your Campus Network?

The better question is, what can't you monitor on campus? Intermapper provides network monitoring for your school for anything with an IP address. Check out the infographic to see examples of the possibilities. PRINT THE INFOGRAPHIC ...
Datasheet

Robot Alert

Robot Alert sends and receives email, text, and SNMP messages in reaction to IBM i events.
Datasheet

Intermapper Getting Started Training Overview

The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment. Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
Datasheet

Security Scan for IBM i

Security Scan for IBM i is a free service centered on Fortra’ expertise with the IBM i platform and its unique security concerns.
Datasheet

Robot Console

Robot Console is a fully automated, customizable tool that sends you only the IBM i messages you need to see. This makes your monitoring more effective—you won’t miss crucial information—and more efficient.
Datasheet

Powertech Antivirus for IBM i

Native Protection for IBM i Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus. Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Datasheet

Powertech Exit Point Manager for IBM i

Protect your organization from the high cost and negative publicity of security breaches by tracking, monitoring, and controlling access to your data with Powertech Exit Point Manager for IBM i. Schedule a demo today. Your Greatest Threat May Come from Within In the age of HIPAA, SOX, and PCI, every company needs a security policy that controls data access for users. In today’s networked...
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...