Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Article
How to Find Your "Normal" with Network Monitoring Software
By Kevin Jackson on Fri, 06/26/2020
With network monitoring software, you can determine what “normal” looks like for your network to easily spot abnormalities, increase uptime, and optimize performance levels.
On-Demand Webinar
Support Your Network During COVID-19 and Beyond with Network Monitoring
Join Kevin Jackson, Technical Solutions Consultant at Fortra, to learn how a network monitoring solution can help you meet the unique challenges of these times and beyond in this on-demand webinar.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
Blog
Key Considerations for Your Network Monitoring Strategy During COVID-19
By Kevin Jackson on Fri, 05/15/2020
Network monitoring software has never been more important. With companies facing unprecedented challenges during COVID-19—from remote work to budget cuts—here’s what to consider when evaluating your network monitoring needs.
Article
How to End MIMIX Headaches for Good
By Chuck Losinski on Wed, 05/13/2020
Ready to eliminate manual monitoring in Assure MIMIX? This article shows you how to start monitoring MIMIX and stop wasting your time and risking your irreplaceable data.
Blog
7 Tips for Delivering Exceptional IT Network Monitoring Support to End Users
By Kevin Jackson on Tue, 05/12/2020
Tech-driven organizations need IT in order to stay productive and meet business goals. As demands on IT departments grow, how can IT continue to deliver exceptional support and service to end users even as demands on their time are higher than ever?
Self-Service Capabilities
Effectively managing user accounts within your Linux or UNIX server environment is imperative for mitigating risk in your organization and ensuring sensitive data and assets are protected. Core Privileged Access Manager (BoKS) provides centralized management of user accounts with automated self-service capabilities for access requests and password management....
Blog
3 Key Strategies for Cloud Infrastructure Monitoring
By Kevin Jackson on Mon, 05/11/2020
Learn three ways to leverage network monitoring for devices in the cloud. From network mapping to network automation, here’s how Intermapper can help you keep an eye on your cloud infrastructure.
Blog
IBM i Disaster Recovery Planning During a Crisis
By Richard Dolewski on Thu, 05/07/2020
As company’s look to cut IT costs during a crisis, don’t scrimp on your disaster recovery investment! Stick to your DR Plan and avoid the temptation to make shortcuts like these.
Network Automation Software
Network issues happen. Fix them fast with our network automation tools.
Blog
What Not to Do for IBM i Disaster Recovery
By Debbie Saugen on Tue, 04/21/2020
It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Press Release
Second Marriott Data Breach Affects 5.2M Guests
Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Press Release
Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach
Alyn Hockey, VP of Product Management at Clearswift, weighs in on the recent Marriott International data breach.
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.