Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Article
IBM on IASP for PowerHA Implementations
By Chuck Losinski on Tue, 03/03/2020
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article
FlashCopy: Pros and Cons
By Tom Huntington on Wed, 02/26/2020
IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Where to Start with IBM i Monitoring
Watch this recorded webinar to learn how Robot Console software can identify bad data, application issues, and device malfunctions and help you monitor IBM i partitions by exception.
Blog
IBM i Data Replication: Hardware vs. Software
By Tom Huntington on Mon, 02/17/2020
There are a lot of options out there for IBM i data replication. We’ll help you weigh the options as your put together the pieces of your high availability plan.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Blog
What's New with High Availability at Fortra?
By Timothy Prickett Morgan on Wed, 11/20/2019
In this interview, IT Jungle's Timothy Prickett Morgan connects with Fortra to get an update on the company’s high availability offerings for IBM i. Read on.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
Article
Mobile Dashboards for IBM i Monitoring
By Chuck Losinski on Wed, 08/07/2019
Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Blog
What Does Db2 Mirror for i Mean for Me?
By Tom Huntington on Wed, 07/10/2019
Take a look at the strengths and weaknesses of IBM’s Db2 Mirror for i and determine how Fortra solutions complement this tool and can further enhance your experience.
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
On-Demand Webinar
Easy IBM i Migrations with Near-Zero Downtime
Upgrading your IBM Power Systems hardware? Robot HA can help you migrate your IBM i data with little to no downtime. Learn how here!
On-Demand Webinar
Monitoring Beyond IBM i Message Queues
Learn how to chuck the manual checklist and teach critical IBM i messages to find you or fix themselves instead. Watch now to see how!
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Article
Two-Way Message Response with Robot
By Chuck Losinski on Wed, 05/01/2019
You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?