Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Don’t Let DLP and Compliance Programs Fail – Here’s How!
In this webinar, we dive into common factors causing DLP and compliance programs to struggle, share top methods to address those factors and improve your current program, and advise on how to stay ahead of the ever-evolving threat landscape.
Infrastructure Protection & Data Security Solutions
Protect business-critical data with automated security solutions that help you stay ahead of today's ever-changing threats.
Data Protection
Fortra provides comprehensive data protection with powerful, modular solutions to ensure your most sensitive data is identified and protected wherever it travels. Learn more about our Data Classification, Data Loss Prevention, Digital Rights Management, and Identity and Access Management Solutions.
Datasheet
Fortra Cybersecurity
Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way.
It’s time to protect your organization with proactive, automated...
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
Reduce the Cost and Effort of IBM i Auditing
By Robin Tatam
IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
On-Demand Webinar
A Shockingly Easy Way to Save Money with IBM i Passwords
By Robin Tatam
When users are unable to sign on to IBM i, productivity stops. Watch this on-demand webinar to learn a simple way to get IBM i users back to work when passwords are forgotten or entered incorrectly.
Blog
NIST’s Surprising New Password Recommendation
By Robin Tatam on Fri, 01/05/2018
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog
Faster and Easier IBM i Password Resets
By Robin Tatam on Wed, 11/08/2017
Security expert Robin Tatam explains an easy way to spend less time and resources on resetting IBM i passwords.
Article
Generate and Distribute Audit Reports Automatically
By Robin Tatam on Mon, 04/03/2017
Despite the server’s incredible security infrastructure, auditing remains primarily a thankless, manual chore. And, let’s face it, any task that’s thankless and manual probably won’t get done.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Powertech Compliance Monitor for IBM i
Consolidated compliance monitoring and reporting across Power servers
Powertech Password Self Help for IBM i
Improve productivity and enhance security