Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
How can organizations stay safe in the age of AI? In this Technology Record article, Theo Zafirakos discusses the dangers of AI and provides expert insights on mitigating those risks.
Security is the responsibility of all employees, from the top down. Theo Zafirakos joined the eChannelNews Security Podcast to discuss how to best implement security awareness programs and the effective strategies for building a security-aware culture.
The Hardware Management Console (HMC) has been around for many years, however, we still get plenty of questions from customers that are not familiar with the HMC. The HMC is nothing to be scared about – and IBM Power Champion Tom Huntington and we'll will show you why during this recorded webinar.
Nowadays, insider threats have become a critical concern for organizations. In the scope of National Insider Threat Awareness Month, Wade Barisoff spoke with VM Blog about the importance of insider threat awareness, and shared valuable insights on how organizations can address these threats.
Bob Erdman joined the Dark Reading News Desk live at Black Hat 2023. He spoke about Fortra’s collaboration with Microsoft and Health-ISAC to stop unauthorized software usage.
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Improving user behavior and implementing interactive education can lower the risk of cyberattacks and help foster a security-conscious organizational culture.