Product Video
Watch a Demo of Powertech Antivirus
Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures.
In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing:
Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and...
On-Demand Webinar
The Power of 24/7 Network Monitoring for Government Entities
Keeping a 24/7 eye on network performance to support critical government initiatives requires powerful networking monitoring software. View this on-demand webinar to learn how a powerful network monitoring solution like Intermapper can help you see the full picture of network health and stay one step ahead of network issues.
On-Demand Webinar
Panel Discussion: Your IBM i Security Action Plan
When your to-do list is a mile long, security might not bubble to the top—unless and until something catastrophic happens.
But dealing with a cybersecurity catastrophe is far more time-consuming (and expensive) than a proactive approach.
Join the Fortra team of IBM i security experts for a discussion geared to help you take concrete steps toward improving your IBM i security posture. They’ll...
Blog
The Basics of Layer 2 Network Mapping
By Kevin Jackson on Mon, 11/16/2020
We explore what Layer 2 does and how it can help you discover more detailed information about the health of your network.
Datasheet
Single Sign On (SSO) Managed Services
Managing user passwords involves unnecessary cost, risk, and lost productivity for most organizations. Yet many IT departments have given up hope of achieving single sign-on due to its complexity and perceived cost.SSO doesn’t have to be expensive or time-consuming, especially if your network includes a Windows domain along with applications running on IBM i (AS/400).Single Sign On Managed...
Press Release
Almost Two-Thirds of Financial Services Firms Have Suffered a Cyber-attack in the Last 12 Months
65% of large Financial Services (FS) firms have suffered a cyber-attack in the last 12 months, according to new research today from data security provider.
Article
Intermapper Is a Government and Defense Approved Network Monitoring Solution
By Kevin Jackson on Fri, 10/30/2020
Intermapper network monitoring software from Fortra is both a GSA-approved solution and recipient of a Certificate of Networthiness (CON), meeting all the technology standards required by the U.S. Army and U.S. Department of Defense (DoD). As part of the GSA Schedule, Intermapper can supply products to federal, state, and local government agencies at contract rates below market value.
Blog
Ask an Expert: What’s Happening and What’s Next in Network Monitoring
Fri, 10/30/2020
See what a network monitoring expert has to say about how strategies are shifting and why the need for network monitoring solutions is more important than ever.
On-Demand Webinar
Encryption on IBM i Simplified
By Robin Tatam
DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Demo
Demo Automate Intelligent Capture
Automate Intelligent Capture leverages intelligent document processing to enhance the power of robotic process automation (RPA) with machine learning capabilities. Easily capture both semi-structured and unstructured data to further extend the benefits of automation across your business.
In a live demo, our team of experts will discuss your organization's unique automation needs and show you how...
Demo
Demo Intelligent Automation
Intelligent automation from Fortra leverages the power of robotic process automation (RPA) and intelligent document processing (IDP) to enhance critical processes. Easily capture both structured and unstructured data to further extend the benefits of automation across your business.
In a live demo, our team of experts will discuss your organization's unique needs and show you how intelligent...
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
By Bob Erdman on Mon, 10/19/2020
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their...
On-Demand Webinar
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Trial
Request a Network Automation Trial
Download a free 30-day trial of our network automation tool to get started!
Network monitoring is only half the solution for network professionals. When you pair network monitoring with automation you can take your essential but incredibly manual network tasks off your plate—like device configuration, reporting, or remediation—and get back to more strategic work.
Your trial of Intermapper...
Blog
5 Reasons Why Technology is Important in Education
By Kevin Jackson on Mon, 08/24/2020
Great learning doesn’t depend on digital tools. So is technology important in education? Two leading IT pros share why they believe the answer is yes.
Article
IBM i Cloud Security Considerations
Fri, 08/14/2020
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.