Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
On-Demand Webinar
IBM i Data: A Picture Is Worth 1,000 Words
As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs).
Decision-makers need to visualize the data before...
On-Demand Webinar
The Ongoing Truth About Viruses on Linux
By Bob Erdman
This webinar focuses on providing an action plan to ensure your Linux environment is properly bolstered against attacks.
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
On-Demand Webinar
How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)
By Bob Erdman
In this webinar, cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders will discuss how to mitigate cyber risk through SIEM.
On-Demand Webinar
Accelerating Programmer Productivity with Sequel
Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
Watch the recorded webinar to see how Sequel:
Makes creating complex results simple
Eliminates barriers to data sources
Increases...
On-Demand Webinar
Top 10 Configuration Mistakes that Leave Your System Vulnerable
Tue, 07/30/2019
Learn about the top 10 IBM i security configuration errors that will leave your system—and therefore, your data and organization—vulnerable.
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
On-Demand Webinar
PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons
Tue, 07/16/2019
Explore the changes in the way systems are deployed, and get a current view of Privileged Access Management in a world without passwords.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
Product Video
Watch a Demo of Event Manager
Separate the critical events from the noise with security information and event management.Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
On-Demand Webinar
What’s the IBM i Community Saying About Business Intelligence?
Hear how the IBM i community achieve their business intelligence goals.
On-Demand Webinar
How to Achieve Single Sign On (SSO) in a Day
Tue, 05/21/2019
Learn a new way to cut through the technical complexity of single sign on.