Join IBM i security expert Amy Williams on June 20th to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed.
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our...
Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. Here’s your chance!
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can...
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Learn key strategies and elements for effective cloud security in this Alert Logic webinar with Nicholas Laing, Solutions Engineer at Fortra. In this webinar, we cover:
Challenges of cloud security
Drivers for cloud adoption
Critical questions for cloud strategy
Cloud adoption phases
Security considerations
Architectural approaches
Security responsibilities and cloud...
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and...
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
While it’s important to adhere to compliance regulations, blunders do happen. What does it mean when these blunders lead to you failing a cybersecurity audit, and how can you recover?
Consequences of Failing a Cybersecurity Audit
Failing a cybersecurity audit can mean several things.
First, there’s the up-front legal fines that come with falling on the wrong side of...
Fortra’s Alert Logic Managed Detection and Response and Digital Guardian Data Loss Prevention have been recognized in Expert Insights’ “Top Solution” awards for Q4 2023.
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this...