Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
News Article
Enhancing Business Resilience & Combining Solutions to Maximize Email Protection
By Ravisha Chugh on Thu, 09/12/2024
Email is a leading gateway for cyberattacks, underscoring the need for businesses to prioritize strong email security. In VMblog, Ravisha Chugh emphasizes that to combat sophisticated threats like Business Email Compromise (BEC) and phishing.
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
News Article
Anti-Phishing Working Group (APWG): Phishing Activity Trends Report for Q2 2024
By John Wilson on Wed, 08/28/2024
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report for Q2 2024, offering an in-depth analysis of recent phishing attacks and identity theft techniques. Fortra contributed to this report, with John Wilson providing insights on business email compromise (BEC).
Guide
How Fortra Supports the MAS TRM Notice and Guidelines
Download this guide to learn how Fortra's solutions can help your organization comply with the MAS TRM notice and guidelines.
Datasheet
Tripwire Enterprise and IBM i
Many of the world's largest companies rely on IBM i operating on IBM Power Servers as their strategic platform for business-critical activities such as retail, distribution, logistics, banking, manufacturing planning, healthcare, insurance, hospitality management, government administration, and legal case management. Given the widespread use of the IBM i operating system, advanced cybersecurity...
Blog
Open-Source IT Tools: Advantages, Disadvantages, and How Halcyon Compares
By Mike Davison on Mon, 08/05/2024
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
News Article
IT Security Wire: Role of Cybersecurity Tools in Email Protection
Thu, 08/01/2024
Cary Hudgins and Mike Jones recently joined the IT Security Wire podcast to dive into the vital role of email protection in business resilience. Since emails are often the first target for cyberattacks, they discussed cutting-edge solutions and emphasized the need for integrating robust email security with your operating platforms.
On-Demand Webinar
IBM i in 2024: From AS400 to AI
Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
Live Event
Sep
24
All day
Article
How to Implement the CIS Controls and Benchmarks on IBM i
By Amy Williams on Mon, 06/24/2024
Discover what the CIS Benchmarks and Controls are, why IBM i organizations should implement them, and how Powertech can help.
News Article
TheMilSource: Where Are We on the US TikTok Ban?
By Antonio Sanchez on Tue, 06/11/2024
Earlier this year, the US President signed a law that would ban TikTok unless its China-based parent company relinquishes its stake. In his discussion with TheMilSource, Antonio Sanchez shared his take on whether ByteDance would sell its stake.
On-Demand Webinar
Elevating Cloud Security: MFT Best Practices & Insights
Wed, 05/22/2024
Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. GoAnywhere Managed File Transfer (MFT) solution provides the security and control needed to move data confidently between systems, locations, users, and trading partners.In this webinar, we will delve into the design and architecture...
Blog
6 Pro Tips from the 2024 State of IBM i Security Study
Mon, 05/06/2024
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2024 State of IBM i Security Study!
News Article
InformationWeek: What the American Privacy Rights Act Could Mean for Data Privacy
By Antonio Sanchez on Fri, 04/26/2024
How could the American Privacy Rights Act impact companies and consumers? In his discussion with InformationWeek, Antonio Sanchez shared his observations about the new draft legislation.
News Article
CyberScoop: Congressional Privacy Bill Looks to Rein in Data Brokers
By Antonio Sanchez on Thu, 04/25/2024
Antonio Sanchez spoke with CyberScoop about the new congressional bill that aims to regulate data brokers.