Press Release
Fortra’s Alert Logic Wins Fortress Cybersecurity Award for Threat Detection
Fortra's Alert Logic Managed Detection and Response (MDR) has won a 2023 Fortress Cybersecurity Award for threat detection services. Fortra’s Terranova Security was recognized as a finalist in the category for security awareness training.
Press Release
Fortra Announces Managed Web Application Firewall to Protect Critical Web Apps and APIs from Compromise
Fully managed service provides customers with comprehensive threat protection, reducing application downtime, and allowing internal resources to focus on product development
Press Release
HelpSystems’ (now Fortra's) Data Security Week LIVE to Give Powerful Insights into Navigating Today’s Cyberthreat Landscape
Data security experts will present virtual, interactive sessions focused on protecting valuable information assets for attendees
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Guide
Integrating IBM i Security Events into Your SIEM
This guide discusses the technical issues relevant to logging IBM i security data and offers a solution for real-time awareness of security events and integration with SIEM solutions.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.
Guide
Download "A Guide to Practical Single Sign On"
The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple.
With single sign on (SSO), you can eliminate passwords—and the cost associated with them—by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to achieving the ROI you...
Guide
Download "CIO Confidential: 5 Things Your IBM i Security Administrator Should Tell You"
Employees on the front lines often possess insight that manager, directors, and executives lack.
Corporate leaders rely on feedback from these professionals, especially when it comes to emerging security threat. But for a variety of reasons, systems administrators might be reluctant to to speak up about critical issues related to IBM i, including the importance of consistently updating...
Guide
Download "How to Securely Deploy Access Client Solutions (ACS) for IBM i"
IBM i Access Client Solutions (ACS) is the newest member of the IBM i Access family, replacing the IBM i Access for Windows client.
ACS runs on most operating systems supporting Java. Because ACS uses different technology and deployment approach than IBM i Access for Windows, the considerations for securely deploying ACS are different than IBM i Access for Windows.
Some of the...
Press Release
Weak Internal Security Causes Weak External Security
Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Press Release
HelpSystems (now Fortra) Extends Security Monitoring to Amazon S3
Policy Minder has been expanded to empower security monitoring for data stored on Amazon S3, giving IT professionals peace of mind any misconfigurations or oversights will be detected and rectified.
Guide
Download "The Complete Guide to Securing IBM i Exit Points"
Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them.
This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their...
Guide
Download "Childhood's End: Attackers Increasingly Take Aim at Linux Systems"
Like the wide-eyed humans who mistakenly trust their benevolent alien overlords in Arthur C. Clarke’s science-fiction classic, Linux users the world over are beginning to awaken to the reality that their malware- free utopian childhood is rapidly coming to an end.
A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes since 2015 means the...
Guide
Download "IBM i Security and Integrity Monitoring Handbook"
Data breaches increase in number and severity every year. Putting barriers in place to stop attackers is an important part of any data protection plan, but barriers alone aren’t enough.
Today’s top IT profressionals know that verifying the effectiveness of cybersecurity controls is critical. After all, most breaches go months before they’re discovered.
Monitoring your security and regularly...
Guide
The Business Leader’s Handbook for Building an Automation Center of Excellence
Creating an automation center of excellence (COE) ensures that you are automating your enterprise with strategy and vision. This guide gives you the expertise you need to put together a great team, follow best practices, and continually optimize your automation COE.
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private information...