Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Sandi Moore on Tue, 09/03/2024
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
The Top 5 Benefits of Remote Network Monitoring
By Kevin Jackson on Mon, 06/10/2024
If your network equipment is located in multiple locations, or your IT team wants to monitor the network on-the-go, remote network monitoring can help.
Blog
What Is Network Monitoring?
By Kevin Jackson on Wed, 05/29/2024
Discover what network monitoring is, why you need it, and the most common tools you can use to monitor your network.
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
On-Demand Webinar
How Fortra Enables Your Zero Trust Strategy
By Nick Hogg
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Powertech Antivirus for IBM i
The recent rise in malware and ransomware attacks has thrown a spotlight on the need to protect servers—including Power Systems servers running IBM i—from malicious programs. Powertech Antivirus for IBM i is a scanning solution built for IBM i to provide the security, stability and reliability modern organizations need.
IBM i includes built-in functionality to support native anti-virus sca...
Powertech Antivirus for Linux
The recent rise in malware attacks proves that every operating system, including Linux, needs protection from malicious programs. In fact, studies have shown that Linux malware now accounts for more than 35% of all malware, tripling in number over the past three years.
Most organizations are running some version of Linux, and for many, it is at the core of their operations. Linux is fundam...
Demo
Want to see what's new in Automate 24.2?
Watch an on-demand demo of the latest Automate release now! Get instant access to an on-demand demo showcasing the latest and greatest features in Automate. Automate 24.2 is here! What you'll see in our latest version:Agent NotificationsDynamic 365 ActionEvaluateExpression(Expression) Extended FunctionWeb Browser Action EnhancementAnd more! ...
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Tue, 12/05/2023
Now more than ever, securing your infrastructure is critical to the success of your organization.