Resources

Product Video

Robot Reports Overview and Demonstration

Robot Reports extracts spool file data and uses it to build customized reports that can then be electronically distributed to stakeholders, accessed and viewed via a browser, and securely stored and organized. Watch this video for an overview and demonstration of how Robot Reports works.
Product Video

Robot Monitor Product Overview and Demonstration

Watch this recording to get an overview of Robot Monitor’s key features – including SQL monitoring, customization to workloads, and the ability to create your own SQL-based monitor – as well as an inside look at how to operate Robot Monitor and customize its outputs to your liking.
Press Release

IBM i marketplace continues to expand

Fortra has published its seventh annual IBM i Marketplace Survey. It shows that use of the IBM i platform has surged during the pandemic. What makes this growth more interesting, is that most of the growth has been on-premises or in private datacentres not in the cloud.
Press Release

Security remains top focus

Fortra has published its seventh annual IBM i Marketplace Survey, exploring how organizations use the IBM i platform and the IT initiatives it supports. Security concerns intensify with challenges over remote worker access.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and PowerLinux...
Product Video

Watch a Demo of Core Privileged Access Manager (BoKS)

Transform your server environment into one streamlined managed security domain. Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...
Press Release

Weak Internal Security Causes Weak External Security

Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.