On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Training
Whether you're evaluating Intermapper as part of our free 30-day trial or onboarding as a new user, we can help. Check out our step-by-step documentation and feature-specific webinars for a smooth, easy start to mapping, monitoring, and alerting with Intermapper.
Get Started Here
Intermapper User Guide: This comprehensive guide covers how to install Intermap...
Blog
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Mon, 03/14/2022
The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools.
According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Demo
Job Schedule Security Options in Robot Schedule
By Chuck Losinski on Mon, 03/14/2022
If you’re familiar with IBM i system security, the Robot Schedule system is easy. IBM i provides a security system that restricts rights to objects. Robot Schedule builds on that system with an optional security system that allows you to restrict the right of users to change various Robot Schedule functions or job data. If you’re familiar with system security, it makes learning Robot Schedule...
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
On-Demand Webinar
Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i
By Rohit Mathur
The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected.
To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them.
Watch our webinar...
Datasheet
Fortra's Security & Automation Portfolios
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that reduces the costly...
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Performance Navigator Training: Automated Performance Reporting
Watch this webinar and learn how to automate daily, weekly, and monthly performance reporting using the Performance Navigator software from Fortra.
On-Demand Webinar
Fortra Champions chat about IBM i
In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.