Guide
Essentials for Privileged Access Management
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide
Anti Malware for Linux, AIX, and IBM i Servers
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...
Blog
What’s New in IBM i 7.2?
By Tom Huntington on Tue, 08/16/2016
May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Article
Where to Start with IBM i Operations
By Tom Huntington on Tue, 08/16/2016
Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
Blog
Is Your Team A Little Rusty on IBM i Operations?
By Tom Huntington on Mon, 08/15/2016
Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Case Study
Powertech Security Auditor Helps CDW Automate Regulatory Compliance Requirements
CDW, a leading provider of technology solutions for business, government, and healthcare, was challenged with meeting strict compliance requirements with minimal staff. The company turned to Powertech Security Auditor to reduce manual processes