Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
Blog
Is There Such a Thing as Free Antivirus for Businesses?
By Bob Erdman on Tue, 11/06/2018
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
Blog
Malware, Virus, Anti-malware, Antivirus: What’s the Difference?
By Bob Erdman on Tue, 10/30/2018
Read on to find out the difference between malware and a virus, and how you can best protect your organization from them.
Blog
Is Antivirus Really Necessary for Linux?
By Bob Erdman on Tue, 10/23/2018
As evidenced by XBash and Kodi add-on malware, the myth that Linux is immune to viruses could not be further from the truth. In reality, Linux is becoming a lucrative target.
Datasheet
Powertech Antivirus
Powertech Antivirus offers the power and protection of an industry-leading scan engine while supporting the specific features of your operating systems. Schedule a demo today.
Blog
Could Ransomware Like WannaCry Hit IBM i?
By Robin Tatam on Thu, 01/04/2018
Security expert Robin Tatam explains how WannaCry and similar ransomware can affect the unique IBM i operating system.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.