Resources

Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Product Video

Watch a Demo of Powertech Antivirus

Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures. In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing: Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and PowerLinux...
Guide

Cybersecurity Insiders 2021 Malware Report

Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies. The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings: More respondents see malware and ransomware...
Guide

Download the Workload Automation Buyer's Guide

Your First Step Towards Purchasing a Workload Automation Solution We know finding the right workload automation solution for your organization isn’t an easy process. There are dozens of details to consider, from 3rd party integrations, to job monitoring and security concerns, that can make choosing a vendor complex. In this ultimate buyer’s guide, you’ll find the information you need to...
Guide

Download "A Guide to Practical Single Sign On"

The cost of managing user access to data and software applications with user IDs and passwords adds up quickly, but the solution is surprisingly simple. With single sign on (SSO), you can eliminate passwords—and the cost associated with them —by joining your IBM i, AIX, and Linux servers to your Windows domain for authentication. The key to achieving the ROI you want is to use a fresh, direct...
Guide

Download "CIO Confidential: 5 Things Your IBM i Security Administrator Should Tell You"

Employees on the front lines often possess insight that manager, directors, and executives lack. Corporate leaders rely on feedback from these professionals, especially when it comes to emerging security threat. But for a variety of reasons, systems administrators might be reluctant to to speak up about critical issues related to IBM i, including the importance of consistently updating security...
Guide

Download "How to Securely Deploy Access Client Solutions (ACS) for IBM i"

IBM i Access Client Solutions (ACS) is the newest member of the IBM i Access family, replacing the IBM i Access for Windows client. ACS runs on most operating systems supporting Java. Because ACS uses different technology and deployment approach than IBM i Access for Windows, the considerations for securely deploying ACS are different than IBM i Access for Windows. Some of the considerations for...
Press Release

Weak Internal Security Causes Weak External Security

Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Guide

Download "The Complete Guide to Securing IBM i Exit Points"

Exit points and exit programs aren’t new concepts, but we get more questions about them than any other topic related to IBM i security. Most people who work with IBM i have heard of them but aren’t sure if they need to use them. This guide is designed to equip IBM i pros with information about what exit points are and how exit programs work, along with their impact on your security posture. One...
Guide

Download the EMA Radar™ Report for Workload Automation

Analyst firm Enterprise Management Associates (EMA) has released its latest Radar™ report for Workload Automation. The Radar report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. In this Radar report, Automate from Fortra has once again been named a Value Leader in workload automation. Fill...