Resources

Live Event
Apr
23
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Live Webinar
Apr
30

IBM Access Client Solutions for System Administration

Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Join this live webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Live Event
Apr
23

Breaking Compliance Into Bite-Sized Portions

Which standards and regulations do you need to comply with? Most organizations have to prove compliance with multiple standards simultaneously to keep their systems secure and avoid audit fines. But it can be difficult to keep up with changing regulations, achieve continuous compliance, or even know where to start. Join presenters Dan Walsh and Antonio Sanchez from Fortra for a live webinar...
Live Webinar
JavaScript injection is a very powerful action for web browser automations. This allows users to interact with a website exactly as the website is expecting. Adding JavaScript to Automate’s web browser actions takes your automation a step further, allowing users to build automation that controls the site as a human would when needed. Join Austin Stanley, Technical Consultant, in this customer...
Live Event
Mar
28
Sometimes the wisest thing we can do as cybersecurity practitioners is to zoom out and look at our systems holistically. Security hardening is the practice of closing potential points of entry over the scope of your entire system, from applications to servers and everything in between. Another way to put this is “shrinking the attack surface.” Join Fortra’s Tripwire and ActualTech for this live...
Live Webinar
Apr
04

How to Transfer IBM i Data to Microsoft Excel

Join our data access expert Greg Schmidt on April 4th as he demonstrates how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
Live Webinar
Feeling limited by the native actions available in your automation software? While native actions are a great building block for user-friendly automation, sometimes you want more flexibility with your integrations. Automate’s custom actions enable you to create your own functionality between your applications and your automation for more control over your workflows. Join Austin Stanley, Technical...
Live Webinar
Mar
26

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Live Webinar
Apr
04

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Live Webinar
Apr
09

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Live Webinar
Join this webinar on March 28th to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
Datasheet

Cloud Migration Bundle for IBM i

If you’re one of the many organizations seeking to replace your current system and leverage the many benefits of cloud computing, your first step is going to be migrating your workloads. Many IT teams don’t have any experience migrating IBM Power workloads to the cloud, which can be difficult. These workloads are often mission critical, and hiccups in their migration process can frequently result...