Resources

Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our...
Blog

Are MSPs Right for Me?

Figure out if MSPs are right for your organization. What are the risks and rewards of managed service providers?
Blog

How to Calculate RPA ROI

    Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?  I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis. Visit this page to...
Blog

How to Get Started with RPA

    RPA is one of the fastest growing segments in the enterprise software space, and I want to tell you just a little bit about it. So, what is RPA? Well, at its simplest, RPA is software that automates human tasks. Four characteristics for a good RPA project Repetitive Tasks Rule Based High Volume Prone to Human Error You might be wondering,...
Case Study

Fortra and Rg19/Load Make Managed IT Easier for Seco Tools

Based in Fagersta, Sweden, Seco Tools AB is one of the world’s largest providers of comprehensive metal cutting solutions for milling, stationary tools, hole-making, and tooling equipment. Seco partners with nearby Rg19/ Load, a managed service provider (MSP), for advanced server monitoring solutions that enable fast response to issues that could disrupt business. The...
Blog

Cracking the Problem of Endpoint Security

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Blog

Building a Better Virus Trap

Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog

The DDoS Deception You Need to Know About

A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog

What is the Value of SIEM?

As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Case Study

Halcyon Helps Computacenter Deliver Efficient Managed Services

Computacenter is Europe’s leading independent provider of IT infrastructure services. They offer consulting services as well as implementation and operation services for networks and data center infrastructures on or off client premises and in the cloud. ...