On-Demand Webinar
10 Timesaving Tips for IBM i Scheduling
Watch this recorded webinar to learn the advanced IBM i (iSeries, AS/400) job management techniques in the Robot scheduling software that deliver measurable ROI.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
3 Ways to Prepare Your Network for Unexpected Times
By Kevin Jackson on Mon, 03/16/2020
Leverage a comprehensive network monitoring solution to ensure smooth network performance when unexpected events arise.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
How A One-Woman IT Department Brought Modern Education Technology to a Rural School District
By Kevin Jackson on Tue, 02/11/2020
Can a rural school district provide students with the same modern technology as larger districts? Lisa Nelson of Douglass ISD in Texas made it her mission to do so, and she succeeded.
Blog
The One IT Software Every Organization Should Budget for This Year
By Kevin Jackson on Tue, 02/11/2020
Now’s the time when organizations finalize their budgets for next year. As spending increases on technology, investing in a network monitoring tool is more important than ever. Find out why and how to justify the ROI to your boss in this article.
Article
The Best Network Monitoring Tool for Universities
By Kevin Jackson on Mon, 02/10/2020
Find out why schools choose Intermapper to monitor bandwidth usage and keep their networks secure and reliable.
Blog
What Does “Real-Time Network Monitoring” Mean, Exactly?
By Kevin Jackson on Fri, 01/31/2020
Real-time network monitoring usually means very, very fast and frequent network polling—which is close enough to real-time that we don’t bother to add caveats around it.
On-Demand Webinar
Security Best Practices for the IBM i Administrator
Tue, 01/28/2020
During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.
Case Study
Alaska Communications Reaches New Heights with Network Monitoring from Intermapper
Alaska Communications is an internet service provider (ISP) supporting communications infrastructure in Alaska. Their team provides critical network services to customers—oftentimes, in remote locations. The company was in the midst of developing plans for a new site—one which was located on a mountaintop. With this remote site, they knew they were in for an uphill battle regarding maintenance and...
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.
On-Demand Webinar
A CISO’s Take on IBM i Security
By Robin Tatam
In this webinar, IBM i security expert Robin Tatam focuses on helping you change perceptions of IBM i at your organization and getting what you need from your management team.
Article
How to Choose the Right Network Monitoring Software for You
By Kevin Jackson on Sun, 12/08/2019
When choosing a network monitoring software, consider these key factors to help find the best solution for your organization.
Blog
What Causes Network Blind Spots—and How to Prevent Them
By Kevin Jackson on Thu, 11/21/2019
A lack of network visibility opens the door to IT disruptions, downtime, and security threats. Here’s what you can do to guard against dangerous network blind spots.