Blog
What is the Fortra Value Proposition for Cybersecurity?
Tue, 03/29/2022
In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Blog
Keeping Cloud Security Top Priority in Your Digital Transformation
By Chris Spargen on Tue, 03/15/2022
Digital transformation is quickly becoming a must for many organizations, and cloud security is perhaps the most fundamental component in its success.
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog
Solving Big Cybersecurity Challenges Needs Big Thinking. Fortra's John Grancarich is Ready.
Fri, 03/11/2022
Tech visionary John Grancarich discusses today’s cybersecurity challenges and Fortra’ innovative plans for helping customers succeed.
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
Guide
Four Ways to RPA: An Exploration of the Different Types of Process Automation
The Evolution of RPA
Robotic Process Automation (RPA) has taken the world by storm in recent years because of its ability to automate mundane tasks that humans are still performing manually. However, automation as a software solution has been around long before the term RPA was widely used. Progressing from script-based automation tools to business process automation to specialized tools for...
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
On-Demand Webinar
Performance Navigator Training: Automated Performance Reporting
Watch this webinar and learn how to automate daily, weekly, and monthly performance reporting using the Performance Navigator software from Fortra.
Article
Content Intelligence: What Is It and Why Is It Important?
By Greg J. Schmidt on Fri, 02/18/2022
There are many different strategies a company can employ to help drive their organization to the next level. But why not use what you already have in your hands? Connect your content, documents, and information together to drive your business to the next level.
Blog
IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity
Wed, 02/16/2022
Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Wed, 02/16/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection.
Q: What mix of technologies do you see as being the optimum...
Blog
Data Security Best Practices Every CISO Should Know
By Scott Messick on Tue, 02/15/2022
Shouldering data security as a CISO is a hefty job. Adopting a few of the best practices to surround data can make it a lot easier.
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022