RPG Toolbox Downloads
Pre-Installation NotesThe Toolbox software restores onto the IBM i as a Licensed Program named 4RPGBOX. After you restore this licensed program, the software will be contained in the library named RPGTOOLBOX.RequirementsTo install the Toolbox, the following requirements must be met:IBM i release 7.2 or greater installed on your IBM i.Your user id must have authority to the RSTLICPGM command.If you...
Datasheet
Fortra’s Email Security Bundles Datasheet
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
On-Demand Webinar
IBM i Performance Week
Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!
Blog
The Top 5 Benefits of Remote Network Monitoring
By Kevin Jackson on Mon, 06/10/2024
If your network equipment is located in multiple locations, or your IT team wants to monitor the network on-the-go, remote network monitoring can help.
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Demo
Want to see what's new in Automate 24.2?
Watch an on-demand demo of the latest Automate release now! Get instant access to an on-demand demo showcasing the latest and greatest features in Automate. Automate 24.2 is here! What you'll see in our latest version:Agent NotificationsDynamic 365 ActionEvaluateExpression(Expression) Extended FunctionWeb Browser Action EnhancementAnd more! ...
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Tue, 12/05/2023
Now more than ever, securing your infrastructure is critical to the success of your organization.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Product Video
Performance Navigator Overview and Demonstration
Wed, 09/27/2023
Watch this video for an overview of Performance Navigator’s key components and a demonstration of how you can use it to optimize your IT enterprise.
IBM i Cloud Migration Bundle
The increasing IBM i skills gap and the desire to eliminate the costs of operating a data center continue to encourage IBM i customers to begin their cloud journey. Migrating IBM Power workloads is a multifaceted process in which many IT teams have little to no experience performing. Our cloud migration bundle offers you the tools as well as the personnel necessary to successfully migrate to the c...
On-Demand Webinar
IBM i Capacity Planning – Cloud, On-Prem, or Hybrid?
By Randy Watson
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.
Blog
Untrustworthy Email in Inboxes Reaches All-Time High
Thu, 06/01/2023
In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%.
Every quarter, PhishLabs...
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
On-Demand Webinar
Sizing Power10 Correctly with Performance Navigator
Watch this 30-minute webinar to learn how to plan your move to Power10, whether it's on-prem, dynamic capacity on-premises (PEP2), or in the cloud.