On-Demand Webinar
Getting Started with Automate Schedule
By Pat Cameron
Watch our guided tour to see Automate Schedule in action.
On-Demand Webinar
How to Control Your Data and Stay Compliant with Robotic Process Automation
By Pat Cameron
Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable.
Watch our on-demand...
Guide
Download "How to Securely Deploy Access Client Solutions (ACS) for IBM i"
IBM i Access Client Solutions (ACS) is the newest member of the IBM i Access family, replacing the IBM i Access for Windows client.
ACS runs on most operating systems supporting Java. Because ACS uses different technology and deployment approach than IBM i Access for Windows, the considerations for securely deploying ACS are different than IBM i Access for Windows.
Some of the...
Blog
3 Ways Malware Can Reach Your IFS
Thu, 12/13/2018
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Why Corporate Networks are Key Targets for Cryptojacking
By Bob Erdman on Thu, 12/06/2018
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
On-Demand Webinar
Why Endpoint Antivirus Belongs in Your Security Environment
By Bob Erdman
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your security profile.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
On-Demand Webinar
Why Your CRM System Needs RPA
By Pat Cameron
Watch our on-demand webinar to learn how you can use RPA to power your CRM system with the most up-to-date data from your critical business applications.
What's New in Automate
Still using Automate version 9, 8, or older? There's been a lot of great new updates since those releases. Automate continues to be a powerful solution to help take your most repetitive, manual processes off your plate to help you increase individual and team productivity. And as Automate adds new features, it conitinually grows the benefits of robotic process automation so you can see g...
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.
Blog
Is There Such a Thing as Free Antivirus for Businesses?
By Bob Erdman on Tue, 11/06/2018
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
Datasheet
Security Scan for IBM i
Security Scan for IBM i is a free service centered on Fortra’ expertise with the IBM i platform and its unique security concerns.
Blog
Malware, Virus, Anti-malware, Antivirus: What’s the Difference?
By Bob Erdman on Tue, 10/30/2018
Read on to find out the difference between malware and a virus, and how you can best protect your organization from them.
Blog
6 Areas Where a Company Can Leverage RPA Software
Mon, 10/29/2018
We’ve identified six key areas to pick from to start leveraging an RPA solution in your workplace.
Blog
Is Antivirus Really Necessary for Linux?
By Bob Erdman on Tue, 10/23/2018
As evidenced by XBash and Kodi add-on malware, the myth that Linux is immune to viruses could not be further from the truth. In reality, Linux is becoming a lucrative target.
Video
RPA in the Real World: Center of Excellence RPA Success Stories
By Pat Cameron
In part three of this three-part webinar series on automation strategy, hear about real-life automation center of excellence RPA success stories as well as more strategies for building your own COE.
Datasheet
Powertech Antivirus for IBM i
Native Protection for IBM i
Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus.
Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Blog
A Simple Way to Enforce Password Best Practices on IBM i
Tue, 10/16/2018
Password guidelines have changed. Learn how the new rules affect IBM i and find out how a simple tool can make it easier to enforce a strong IBM i password policy at your organization.