Article
Interacting with Powertech SIEM Agent for IBM i
By Robin Tatam on Thu, 03/21/2019
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
On-Demand Webinar
RDi and the Sleeping Giants
How does Rational Developer for i (RDi) empower RPG coders? Watch this webinar with Jim Buck, Susan Gantner, and Charlie Guarino to find out!
Blog
Cloud Watching: Ensuring Security in Every Cloud Environment
By Bob Erdman on Fri, 11/02/2018
Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Datasheet
Powertech SIEM Agent for IBM i
Powertech SIEM Agent takes raw security event data from IBM i and converts it into a meaningful format for security operations staff. Schedule a demo today.
Blog
How SIEM Protects Cloud Servers
Tue, 10/16/2018
Security information and event management (SIEM) applications help IT professionals oversee their vast technology infrastructures, including cloud repositories. SIEM applications aggregate data from many different types of systems to present a clear view of the actionable security tasks your team must address to protect your business.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in the number of SIEM...
Blog
SAO vs. SIEM: Not Enemies, But a Security Defending Duo
Thu, 08/16/2018
As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
Datasheet
Event Manager
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Schedule a demo today.
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
On-Demand Webinar
Deploying Multi-Factor Authentication in Your Enterprise
By Robin Tatam
Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.
MFA protects you from the most common cause of a data breach: compromised...
Blog
How to Apply IDS/IPS to IBM i
By Robin Tatam on Fri, 05/12/2017
IPS/IDS are common cybersecurity terms, but how does that pertain to the IBM i environment?