Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
JAMS Feature Tour
Wed, 12/04/2019
Join Robert Newman for this condensed feature tour!
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
Article
Empower Your Security Monitor with Powertech SIEM Agent for IBM i
By Robin Tatam on Wed, 08/28/2019
Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
Case Study
SQL SCHEDULING GOES ENTERPRISE
Company Background
Frontline Technologies is a market leader in workforce management software. The Pennsylvania company serves thousands of global clients through its three applications: Aesop, an automated substitute placement and absence management system; Veritime, a time and attendance product; and Jobulator, an automatic job-notification service for substitute teachers. One in every five U.S...
Case Study
SharkNinja Uses Fresh Retail Data for Fast Decision-Making with JAMS
Company Background
SharkNinja is the maker of class-leading Shark® vacuums and steam mops, and the innovative line of Ninja® kitchen appliances. Shark® and Ninja® are two of several house-care brands developed by SharkNinja Operating LLC, a pioneer in small household appliances and cleaning solutions that fit the lifestyles of busy people.
The company’s products are widely distributed through...
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Datasheet
Powertech SIEM Agent for IBM i
Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Datasheet
Powertech Multi-Factor Authentication
Powertech Multi-Factor Authentication is a robust MFA solution for IBM i (AS/400, iSeries), it is a simple and effective way to ensure the users accessing your systems are who they say they are. Schedule a demo today.
Datasheet
Powertech Multi-Factor Authentication Compliance Datasheet
Comply with Security Standards, Including PCI DSS
The latest version of the Payment Card Industry Data Security Standard requires multi-factor authentication (MFA) for all administrator access into the cardholder data environment (CDE), even from within a trusted network. MFA also simplifies compliance with mandates concerned with data privacy, like HIPAA and GDPR. Powertech Multi-Factor...
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
On-Demand Webinar
How Multi-Factor Authentication Can Prevent an IBM i Data Breach
By Robin Tatam
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?