Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Take a look at the strengths and weaknesses of IBM’s Db2 Mirror for i and determine how Fortra solutions complement this tool and can further enhance your experience.
You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.