Blog
Key Considerations for Your Network Monitoring Strategy During COVID-19
By Kevin Jackson on Fri, 05/15/2020
Network monitoring software has never been more important. With companies facing unprecedented challenges during COVID-19—from remote work to budget cuts—here’s what to consider when evaluating your network monitoring needs.
On-Demand Webinar
External vs. Internal Storage: Which Is Right for Me?
Watch this webinar where our panel of technology experts discuss the reasons why many organizations are taking advantage of SAN technology for virtualization, high availability, backup management, and more.
Blog
7 Tips for Delivering Exceptional IT Network Monitoring Support to End Users
By Kevin Jackson on Tue, 05/12/2020
Tech-driven organizations need IT in order to stay productive and meet business goals. As demands on IT departments grow, how can IT continue to deliver exceptional support and service to end users even as demands on their time are higher than ever?
Self-Service Capabilities
Effectively managing user accounts within your Linux or UNIX server environment is imperative for mitigating risk in your organization and ensuring sensitive data and assets are protected. Core Privileged Access Manager (BoKS) provides centralized management of user accounts with automated self-service capabilities for access requests and password management....
Blog
3 Key Strategies for Cloud Infrastructure Monitoring
By Kevin Jackson on Mon, 05/11/2020
Learn three ways to leverage network monitoring for devices in the cloud. From network mapping to network automation, here’s how Intermapper can help you keep an eye on your cloud infrastructure.
Blog
IBM i Disaster Recovery Planning During a Crisis
By Richard Dolewski on Thu, 05/07/2020
As company’s look to cut IT costs during a crisis, don’t scrimp on your disaster recovery investment! Stick to your DR Plan and avoid the temptation to make shortcuts like these.
Blog
Solid State Drives with IBM Power Servers
By Tom Huntington on Tue, 04/28/2020
Using solid-state drives (SSDs) in IBM Power servers can provide numerous advantages over traditional HDDs, namely in the area of computing performance. See some of those benefits here.
On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
Network Automation Software
Network issues happen. Fix them fast with our network automation tools.
Blog
What Not to Do for IBM i Disaster Recovery
By Debbie Saugen on Tue, 04/21/2020
It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Article
Clearswift – staying safe and secure throughout the coronavirus pandemic
Thu, 04/16/2020
The coronavirus (COVID-19) situation is changing rapidly on a day-to-day basis, so we wanted to take this opportunity to address what it means for Clearswift and Fortra as a global organization and an employer, and how it might impact on our customers, prospects and partners.
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Press Release
Second Marriott Data Breach Affects 5.2M Guests
Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Press Release
Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach
Alyn Hockey, VP of Product Management at Clearswift, weighs in on the recent Marriott International data breach.
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.