-
Alan Jordan |
Greg J. Schmidt
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our...
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
On-Demand Webinar
Cut Through QSYSOPR Message Confusion
Watch as IBM i experts Tom Huntington and Chuck Losinski discuss best practices for message management on your IBM i. They’ll break down each step in the process and provide you with a range of message management options.
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
News Article
e-ChannelNews Interview with Mark Bell: Core Security Releases New Ransomware Simulator
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Datasheet
LEVEL 4: Operations Center Suit
Does This Sound Familiar?
How would you answer the following questions?
Can you schedule highly complex job streams and track them across different IBM i systems or servers?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or...
Datasheet
LEVEL 3: Advanced Automation Suite
Does This Sound Familiar?
How would you answer the following questions?
Are you making effective use of system resources by running jobs at the best time?
Do you receive alerts if performance thresholds are breached?
Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action?
Can you automate disk space management, freeing technical...
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.
Learn how a proactive cybersecurity program can be a game changer for an organisation's success through...
On-Demand Webinar
Combatting Ransomware on IBM i
By Sandi Moore
Join this webinar to learn how to create an effective strategy for ransomware prevention.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
On-Demand Webinar
Halcyon Features for Large Environments
Watch this webinar and learn how to leverage Halcyon monitoring software in large environments such as managed service providers (MSPs) and companies with multiple IBM i environments.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Datasheet
Level 2: Systems Operations Suite
What Is Level 2: Systems Operations Suite?
Level 2 of the Halcyon IBM i Server Suites, Systems Operations Suite offers powerful and highly functional automation features for even tighter control of mission-critical business applications and processes. This solution provides total peace of mind that your IBM i is running at its full potential and maximizing system uptime for...
Datasheet
Level 1: Message Management Suite
Level 1 of the Halcyon IBM i Server Suites, Message Management Suite is an entry-level system monitoring and automation solution for the IBM i operating system. Unlike the basic system reply list that ships with IBM i servers, Level 1 addresses the fact that system-critical information messages often go unnoticed on a busy system.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.