Resources

News Article

Keeping Personal Data Secure

With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at Fortra looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from Fortra in 2022.
On-Demand Webinar

IBM i Automation Series: Job Scheduling

Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar

How to Keep Sensitive Data Safe and Compliant

Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection...
Datasheet

LEVEL 4: Operations Center Suit

Does This Sound Familiar? How would you answer the following questions? Can you schedule highly complex job streams and track them across different IBM i systems or servers? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or...
Datasheet

LEVEL 3: Advanced Automation Suite

Does This Sound Familiar?  How would you answer the following questions? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action? Can you automate disk space management, freeing technical...
News Article

How COVID-19 Changed CISOs Approach to Data Security

Fortra partnered with Information Security Media Group (ISMG) to gather CISO perspectives on how the pandemic permanently changed cybersecurity. In this interview, watch Cary Hudgins, Vice President of Product at PhishLabs by Fortra share his views on the survey results.
Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are...
On-Demand Webinar

Native & Real Time Endpoint AV for IBM Power servers - AIX, Linux & IBM i

The truth is malicious programs affect every OS and even though malware and other destructive entities can just as easily target your servers (both on-premises or in the cloud), many remain unprotected. To keep your data secure and your systems up and running, it’s critical to grasp the true impact malware can have on Power Systems servers and the network that connects to them...
Datasheet

Fortra's Security & Automation Portfolios

Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that...
Datasheet

Level 2: Systems Operations Suite

What Is Level 2: Systems Operations Suite? Level 2 of the Halcyon IBM i Server Suites, Systems Operations Suite offers powerful and highly functional automation features for even tighter control of mission-critical business applications and processes. This solution provides total peace of mind that your IBM i is running at its full potential and maximizing system uptime for...