Resources

Guide

Choosing the Right SIEM Solution to Face Today's Security Challenges

What Makes a SIEM Solution Effective? SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind. Given the immense benefits and an increase in the number of SIEM...
Blog

SAO vs. SIEM: Not Enemies, But a Security Defending Duo

As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
On-Demand Webinar

IBM i Marketplace Check-In with IBM Champions

Halfway through 2018—how are you doing on your IT initiatives? Watch this to learn how your peers on the platform are doing and get expert tips on how to move important IBM i projects forward at your own organization.
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their impact on your security posture. One...
On-Demand Webinar

The Truth About Viruses on Linux

This webinar is designed to re-assess the threat landscape and learn which metrics your technical staff must use when assessing server-side tools that virus scan for both Windows and Linux threats in parallel.
On-Demand Webinar

Banking on IBM i

Hear how IBM i Systems Engineer Kevin Aker from Old National Bank took an automated approach to systems management.
Guide

10 Hidden Gems of BRMS for IBM i

Get insider tech tips on the most helpful features of Backup, Recovery and Media Services for i (BRMS)! What if your IBM i came equipped with a tool that could help you automate and manage backup/recovery across your enterprise IBM i environment? What’s that, you say? It’s called BRMS for i? That’s right! BRMS is already available as a licensed program product (LPP), yet many IBM i shops are not...
On-Demand Webinar

Simplify PowerHA Hardware Replication with POWER9

How do POWER9 and PowerHA fit together? In this recorded webinar, experts from IBM and Fortra introduce you to the new POWER9 technology, especially as it relates to PowerHA hardware replication and storage area networks (SAN). Complete the form to access: Insight on the POWER9 hardware that supports PowerHA Better understanding of the PowerHA family Live demo of PowerHA Cluster setup and role...