Datasheet
Trap Receiver
Trap Receiver enables you to receive and interpret incoming SNMP traps from capable devices, automatically presenting them in the format of your choice.
Datasheet
Task Supervisor
Task Supervisor can simplify your task management and allow you to take control of your IT task list.
Datasheet
HA-MX Monitor
HA-MX Monitor ensures a maximum return on your investment for your MIMIX solution and helps eliminate lost income as a result of downtime.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
Core Impact
Simple enough for your first test, powerful enough for the rest.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Blog
The Pros & Cons of Network Diagrams
Mon, 04/22/2019
Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams.
s Not Loading? Check out the Text Version
Keeping your network up and running can seem like an uphill battle. Especially without...
Blog
Why Does EdTech Matter to a Network Admin?
Tue, 04/16/2019
As chalkboards give way to computer screens and other devices, like smartboards and tablets, it’s important to understand IT’s impact of embracing educational technology.
Blog
What Can You Monitor on Your Campus Network?
Thu, 03/14/2019
The better question is, what can't you monitor on campus? Intermapper provides network monitoring for your school for anything with an IP address. Check out the infographic to see examples of the possibilities.
PRINT THE INFOGRAPHIC
...
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
Datasheet
Intermapper Getting Started Training Overview
The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment.
Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
On-Demand Webinar
Get to Know Intermapper in 15 Minutes
What is Intermapper, and why should I choose it? Watch this brief 15-minute overview and find out what makes Intermapper special and how easy it is to get started.
Blog
Bridging the Gap Between Cloud and On-Premises Devices When Monitoring Hybrid IT
Wed, 11/14/2018
Learn how network monitoring can help you bridge the gap between on-premises and cloud devices when monitoring hybrid IT environments.
Datasheet
Powertech SecurID Agent for IBM i
Powertech SecurID Agent for IBM i brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Schedule a demo today.
Datasheet
Powertech Identity Manager for IBM i
Powertech Identity Manager for IBM i offers a solution to the complications of user profile management. It provides a centralized approach for administrators to create and manage user profiles on one system or across multiple systems. Schedule a demo today.
Datasheet
Powertech Encryption for IBM i
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Blog
Network Monitoring for Government Agencies: Areas of Focus
Thu, 08/30/2018
Network monitoring is crucial to ensuring a healthy network with maximum uptime for your users. But as a government agency, it’s even more critical.
Datasheet
Powertech Encryption for IBM i Compliance Datasheet
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Article
A Beginner’s Guide to IBM i System Administration
Fri, 07/13/2018
Despite popular opinion, IBM i is not bulletproof and cannot completely manage itself. But the operating system does make it easier for administrators.