Resources | Fortra

Resources

On-Demand Webinar

Wie Sie die Sicherheit und Effizienz Ihrer Dateiübertragungen verbessern können

Obwohl es EDI und Verschlüsselung schon seit Jahrzehnten gibt, geht es bei der Übertragung sensibler Daten vor allem um Geschwindigkeit, Umfang und Sicherheit. Nehmen Sie an diesem Webinar teil und erfahren Sie mehr über die folgenden Punkte: - Die besten Methoden für den internen Datenaustausch - Welche Daten am wertvollsten sind - Was macht Dateiübertragungen so unsicher? - Häufige Fallen bei...
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone), with $408 billion in losses projected by 2030...
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.
On-Demand Webinar

IBM i in 2022: It’s Not Just AS/400

Discover our experts' unique perspective on the direction of IBM i and how to optimize your strategy surrounding it.
On-Demand Webinar

The Evolution of IBM i in the Data Center

AS/400, iSeries, IBM Power Systems—by any name, IBM i has stood the test of time. This proven technology continues to serve the needs of changing data centers around the world, but can its secrets of past success teach us what to expect next?
On-Demand Webinar

Promoting the Future of IBM i in Your Business

Yes "i" can! Get tips for selling your peers and executives on the low total cost of ownership of IBM i and enhance your organization’s strong heritage on the platform.
Blog

Tips for Preparing for an IBM i Security Audit

Many administrators experience what I call the "audit fire drill" when they hear they're about to undergo a security audit. Follow these strategies to eliminate some of the panic when preparing for an audit.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...
Blog

What GDPR Fines Mean for IBM i

The EU’s General Data Protection Regulation (GDPR) has changed the way organisations around the world approach data security. Even if your centre of operations is nowhere near Europe, you must take stock of your IBM i security controls and evaluate what this compliance law means for you if you are processing personal data from people located in the European Union. The GDPR deadline has passed, but...
Blog

Is the AS/400 Dead?

Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
On-Demand Webinar

Meeting GDPR Compliance with Robotic Process Automation

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018. Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...