Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?
I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis.
Visit this page to get access to...
Blog
Working with Software Robots: Top 5 Ways to Spark Collaboration with RPA Bots
Tue, 09/10/2019
Learn how with robotic process automation (RPA), your employees can work with collaborative robots to be more productive, accurate, and get more free time.
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
Article
Getting Started with Website Automation
Wed, 07/24/2019
Set up a website automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and set up a web automation task today.
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Blog
How to Get Started with RPA
By John Grancarich on Fri, 07/05/2019
RPA is one of the fastest growing segments in the enterprise software space, and I want to tell you just a little bit about it. So, what is RPA? Well, at its simplest, RPA is software that automates human tasks.
Four characteristics for a good RPA project
Repetitive Tasks
Rule Based
High Volume
Prone to Human Error
You might be wondering, is this even...
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your AIX Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
Blog
User Groups, and Forums, and Blogs, Oh My: Top 7 Linux Resources to Increase Your Expertise
By Bob Erdman on Mon, 01/14/2019
Find what you need in our compiled list of Linux resources.
Blog
3 Ways Malware Can Reach Your IFS
Thu, 12/13/2018
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Why Corporate Networks are Key Targets for Cryptojacking
By Bob Erdman on Thu, 12/06/2018
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.