-
Tyler Reguly
Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
How to Get the Most Out of Cybersecurity Best Practice Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the...
-
Steven Sletten
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Product Video
Performance Navigator Overview and Demonstration
Wed, 09/27/2023
Watch this video for an overview of Performance Navigator’s key components and a demonstration of how you can use it to optimize your IT enterprise.
Tripwire ExpertOps
The Industry’s Best FIM, SCM, and VM as a Managed Service
Tripwire® ExpertOps provides file integrity monitoring (FIM), security configuration management (SCM), and vulnerability management (VM) as a managed service to arm you with the solution operation, support, and advice you need to stay compliant and reduce your attack surface.
...
Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and Compliance
With decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
...
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Product Video
Robot Monitor Product Overview and Demonstration
Wed, 07/26/2023
Watch this recording to get an overview of Robot Monitor’s key features – including SQL monitoring, customization to workloads, and the ability to create your own SQL-based monitor – as well as an inside look at how to operate Robot Monitor and customize its outputs to your liking.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a...
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Article
Getting to Grips with QZDASOINIT Jobs
By Kurt Thomas on Fri, 09/30/2022
QZDASOINIT job issues can cause high CPU usage and hurt IBM i (iSeries, AS/400) performance. Learn how using Robot Monitor can help you proactively avoid resource issues.
On-Demand Webinar
Sizing Power10 Correctly with Performance Navigator
Watch this 30-minute webinar to learn how to plan your move to Power10, whether it's on-prem, dynamic capacity on-premises (PEP2), or in the cloud.
On-Demand Webinar
Affordable and Easy-to-Use High Availability with Robot HA
Watch this webinar to learn from our IBM i experts as they demonstrate how easy it is to navigate Robot HA and the simplicity of creating new rules.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
On-Demand Webinar
Performance Navigator Training: Automated Performance Reporting
Watch this webinar and learn how to automate daily, weekly, and monthly performance reporting using the Performance Navigator software from Fortra.
On-Demand Webinar
Fortra Champions chat about IBM i
In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.