On-Demand Webinar
Determining the Best Approach to PAM for You
Tue, 10/23/2018
David Dingwall provides an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.
Datasheet
Powertech SecurID Agent for IBM i
Powertech SecurID Agent for IBM i brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Schedule a demo today.
Datasheet
Core Privileged Access Manager (BoKS)
Learn more about a critical Systems and Data Access Management Software for Linux and UNIX. Schedule a demo of Core Privileged Access Manager (BoKS) today.
On-Demand Webinar
The Effects of Cloud Migration on IAM, PAM, and Audit
Tue, 09/18/2018
With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
Blog
Network Monitoring for Government Agencies: Areas of Focus
Thu, 08/30/2018
Network monitoring is crucial to ensuring a healthy network with maximum uptime for your users. But as a government agency, it’s even more critical.
Product Video
Intermapper Feature Tour
Don't have time to join our live webinar? Get the Intermapper Feature Tour on-demand!
Intermapper network monitoring software is both powerful and easy to use. Get visibility into real-time network performance with our flexible network mapping and monitoring solution for all your physical and virtual equipment. Let Kevin Jackson, our Technical Solutions Consultant, give you a...
Article
How to Download an ODBC Driver
Wed, 07/25/2018
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article
FAQs about Performance Navigator
Thu, 07/12/2018
Will this product hurt the performance of my IBM i®?
You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service.
How is Performance Navigator compared to PM?
Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services....
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
On-Demand Webinar
What Does GDPR Mean for Linux/UNIX and IT Operations?
Tue, 05/22/2018
Find out how GDPR will affect IT Operations on Linux and UNIX.
On-Demand Webinar
Network Monitoring is Critical for the Internet of Things
Learn how Intermapper’s robust network monitoring capabilities give you a critical safeguard against the dangers lurking in the Internet of Things.
product_sub_page
Sudo Migration Made Simple
Sudo’s “free” open-source access utility can work for managing access to a small number of servers. However, it quickly becomes overwhelming as your business grows and requires more sophisticated fine-grain controls, logging, and compliance-reporting capabilities.
Sudo’s labor-intensive custom configuration and distribution process results in high administrative costs and serious gaps in access...
On-Demand Webinar
The Secret to Speedy Remediation
Learn how to cut your remediation time from hours to minutes thanks to an integration between two Fortra products, Intermapper and Automate.
product_sub_page
Windows SSH Client for Centralized Access Control
Since the end of the “PKI Wars” in the early 2000s, many question the security of Windows desktops environments. This is because it can be difficult to verify whether they’ve been fully locked down.
For Linux/UNIX administrators the tool of choice to log in to systems for remote session administration is PuTTY, a free command line tool, or SuperPuTTY, a Windows edition with scalable windo...
product_sub_page
Provisioning Accounts to Multiple Security Domains
Core Privileged Access Manager (BoKS)’s main strength is its ability to create a single security domain of your IT assets, with a single policy set. There are, however, valid reasons to segregate networks, and infrastructure due to:
Differing IT governance, often due to historical M&A activities
The need to report to multiple market regulators or compliance regimes
Public internet-fa...