On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
On-Demand Webinar
I Have All Object Authority and I’m Not Afraid to Use It!
By Amy Williams
In this webinar, security expert Amy Williams explores best practices for All Object authority and strategies for correcting this vulnerability.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
On-Demand Webinar
How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)
By Bob Erdman
In this webinar, cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders will discuss how to mitigate cyber risk through SIEM.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
On-Demand Webinar
44 Percent of Your IBM i Users Can Do WHAT?!
By Robin Tatam
Your IBM i power users are one of your greatest assets. But on most systems, they're also one of your greatest security vulnerabilities. Find out how to regain control.
Case Study
AAA Life Leverages Fortra Solutions for IT Efficiency
Part of the American Automobile Association (AAA) family, AAA Life Insurance Company offers a variety of competitive life insurance, annuity, and travel accident products. With over one million policies, many people rely on AAA Life to help provide protection for their loved ones.
As Senior Systems Engineer at AAA Life, Randy Wittner is in charge of their IBM i environment, overseeing two S824...
Case Study
Powertech Protects Healthcare Company’s IBM i Systems to the Max
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.