Resources

On-Demand Webinar

IBM i Security for Programmers

In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Blog

Cyber Security Risk Mitigation: Statistics & Strategies

Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog

The Pros and Cons of Scripting

There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
Video

5 IBM i Security Quick Wins

IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
Press Release

HelpSystems’ (now Fortra's) GoAnywhere Cloud Connectors for Salesforce, Dropbox, and More Are in High Demand for Secure Managed File Transfer

GoAnywhere MFT Cloud Connectors are popular among Fortra customers for their ability to connect with everyday business applications to automate secure file sharing. Not only is Fortra actively updating and improving previously released Cloud Connectors based on customer feedback, it also encourages users to create their own integrations.
Guide

Free eBook: Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook , you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...